What activity is being performed when you apply security controls based on the specific needs of the IT system that they will be applied to?

A. Standardizing
B. Baselining
C. Scoping
D. Tailoring

Answer: C. Scoping

Computer Science & Information Technology

You might also like to view...

Each data source in a master bibliography database is stored within an individual ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

An image that is stored as pixels is called a(n) ________ image

Fill in the blank(s) with correct word

Computer Science & Information Technology