The effectiveness of the plan of action to secure sensitive data is demonstrated through focused audits of the ____.
A. data security process
B. compliance process
C. risk process
D. privacy process
Answer: D
Computer Science & Information Technology
You might also like to view...
40-bit WEP and 64-bit WEP are the same thing
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following allows an auditor to test proprietary-software compiled code for security flaws?
A. Fuzzing B. Static review C. Code signing D. Regression testing
Computer Science & Information Technology