__________ ensures that critical assets are sufficiently protected in a cost-effective manner.

A. IT control B. IT security management

C. IT discipline D. IT risk implementations

B. IT security management

Computer Science & Information Technology

You might also like to view...

Does a PKI use symmetric or asymmetric encryption? Explain your answer

What will be an ideal response?

Computer Science & Information Technology

The UPDATE privilege is a type of object privilege.

a. true b. false

Computer Science & Information Technology