The final step of the security auditing process is a ____ meeting.

A. feedback
B. debriefing
C. research
D. validation

Answer: B

Computer Science & Information Technology

You might also like to view...

P2P stands for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

When selected, the ________ field property requires that each record contain a value not found in any other record

A) Description B) Unique C) Caption D) Foreign

Computer Science & Information Technology