Once the system is appropriately built, secured, and deployed, the process of maintaining security is ________.

A. complete B. no longer a concern

C. continuous D. sporadic

C. continuous

Computer Science & Information Technology

You might also like to view...

A style set is a group of title, heading, and paragraph styles

Indicate whether the statement is true or false

Computer Science & Information Technology

The terms 10Base2, 10BaseT, 100BaseT, and 1000BaseT are typically associated with networks

A) Ethernet B) Ring C) ARCnet D) RF

Computer Science & Information Technology