The proper development of a security policy is accomplished through what is called the ____.

A. software life cycle
B. data life cycle
C. assets policy cycle
D. security policy cycle

Answer: D

Computer Science & Information Technology

You might also like to view...

Compressing a photo can make it easier and faster to send it in an e-mail

Indicate whether the statement is true or false

Computer Science & Information Technology

Which what-if analysis tool is the best tool for evaluating various scenarios based on variables within a formula?

A) Goal Seek B) Solver C) Scenario Manager D) One-variable data table

Computer Science & Information Technology