The ____ are an explicit statement of the expected outcome of each information security activity.
A. controls
B. control objectives
C. control structures
D. control blocks
Answer: B
Computer Science & Information Technology
You might also like to view...
Part of activating a cell phone includes the recording of a mobile identification number
Indicate whether the statement is true or false
Computer Science & Information Technology
Name two possible triggers for a behavior
What will be an ideal response?
Computer Science & Information Technology