The ____ are an explicit statement of the expected outcome of each information security activity.

A. controls
B. control objectives
C. control structures
D. control blocks

Answer: B

Computer Science & Information Technology

You might also like to view...

Part of activating a cell phone includes the recording of a mobile identification number

Indicate whether the statement is true or false

Computer Science & Information Technology

Name two possible triggers for a behavior

What will be an ideal response?

Computer Science & Information Technology