The proper development of a security policy is accomplished through what is called the ____.
A. software life cycle
B. data life cycle
C. assets policy cycle
D. security policy cycle
Answer: D
Computer Science & Information Technology
You might also like to view...
Compressing a photo can make it easier and faster to send it in an e-mail
Indicate whether the statement is true or false
Computer Science & Information Technology
Which what-if analysis tool is the best tool for evaluating various scenarios based on variables within a formula?
A) Goal Seek B) Solver C) Scenario Manager D) One-variable data table
Computer Science & Information Technology