What activity is being performed when you apply security controls based on the specific needs of the IT system that they will be applied to?
A. Standardizing
B. Baselining
C. Scoping
D. Tailoring
Answer: C. Scoping
Computer Science & Information Technology
You might also like to view...
Each data source in a master bibliography database is stored within an individual ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
An image that is stored as pixels is called a(n) ________ image
Fill in the blank(s) with correct word
Computer Science & Information Technology