Multiple Choice
The textbook identifies a number of issues that should be considered when developing a security policy.One of the issues is "identify threats".Which of the following is not an example of this issue?
A) What assets need to be protected
B) What are the sources of potential security problems
C) External threats are viruses,worms,retaliations from former employees
D) Internal threats are misuse of assets by employees and embezzlement
Correct Answer:

Verified
Correct Answer:
Verified
Q25: A CPA reviews a client's payroll procedures.The
Q28: Which of the following is not a
Q32: Both external and internal file labels are
Q34: An internal label may be used only
Q35: A business continuity plan (BCP)includes which of
Q38: _ permit data to be written on
Q51: Testing processing programs with test data is
Q53: Which of the following types of errors
Q58: A very effective ID approach for safeguarding
Q72: In an online, real-time system, which of