The _______ plan documents what needs to be done for each selected control, along with the personnel responsible, and the resources and time frame to be used.
Fill in the blank(s) with the appropriate word(s).
IT security
Computer Science & Information Technology
You might also like to view...
Access object names can contain up to ____ characters.
A. 16 B. 32 C. 64 D. 128
Computer Science & Information Technology
A __________ is a dedicated computer that interfaces with computers outside a network and has special security precautions built into it in order to protect sensitive files on computers within the network.
A) firewall B) ACL C) matrix D) guard
Computer Science & Information Technology