The final step of the security auditing process is a ____ meeting.
A. feedback
B. debriefing
C. research
D. validation
Answer: B
Computer Science & Information Technology
You might also like to view...
P2P stands for ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
When selected, the ________ field property requires that each record contain a value not found in any other record
A) Description B) Unique C) Caption D) Foreign
Computer Science & Information Technology