The effectiveness of the plan of action to secure sensitive data is demonstrated through focused audits of the ____.

A. data security process
B. compliance process
C. risk process
D. privacy process

Answer: D

Computer Science & Information Technology

You might also like to view...

40-bit WEP and 64-bit WEP are the same thing

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following allows an auditor to test proprietary-software compiled code for security flaws?

A. Fuzzing B. Static review C. Code signing D. Regression testing

Computer Science & Information Technology