B. Development group: group of persons who develop the policyC. Resource group: resources controlled by the policyD. Access group: group of users to which the policy appliesCorrect Answer:B
Section: (none)ExplanationExplanation/Reference:QUESTION 47Computer viruses are malicious software programs that infect computers and corrupt or delete the data on them. Identify the virus type that specifically infectsMicrosoft Word files?CSection: (none)
Get answer to your question and much more
ExplanationExplanation/Reference:QUESTION 48The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables members of CSIRT to undertake any necessary actions on behalf of theirconstituency?A
Get answer to your question and much more
Section: (none)ExplanationExplanation/Reference:QUESTION 49Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The personal computer of the criminal in question was confiscated by the county police.Which of the following evidence will lead John in his investigation?D
Get answer to your question and much more
Section: (none)Explanation- Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com