Multiple Choice
Information security policies would be ineffective without _____ and _____.
A) audit; enforcement
B) accountability; flexibility
C) compliance; objectivity
D) regulation; transparency
E) consistency; adaptability
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q11: According to research firm Gartner, the majority
Q33: What security risk could be posed by
Q40: Which of the following actions should users
Q41: _ can be either software-based or hardware,
Q56: Web sites of reputed companies can also
Q57: Worms require an executable (a running program)
Q76: Viruses are programs that infect other software
Q77: An attack on the US power grid
Q81: A research scientist with a major pharmaceutical
Q84: _ refers to a term that either