Which of the following should be included in an
organization's IS security policy?

A. A list of key IT resources to be secured

B. The basis for access authorization

C. Identity of sensitive security features

D. Relevant software security features

Answer Posted / guest

Answer: B

The security policy provides the broad framework of
security, as laid down and approved by the senior
management. It includes a definition of those authorized to
grant access and the basis for granting the access. Choices
A, B and C are more detailed than that which should be
included in a policy.

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

purchase orders issued to vendors have been authorized as per the authorization matrix

1101


WHICH OF THE FOLLOWING IS OFTEN AN ADVANTAGE OF USING PROTOTYPING GOR DYDTEM DVELOPMENT

2851