Which of the following provides the framework for designing
and developing logical access controls?
A. Information systems security policy
B. Access control lists
C. Password management
D. System configuration files
Answer Posted / edith
When outsourcing, in order to ensure that third-party service providers comply with an organization security policy, which of the following should occur?
Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers