An IT security plan should include details of _________.

A. risks B. recommended controls
C. responsible personnel D. all of the above

D. all of the above

Computer Science & Information Technology

You might also like to view...

Which is not a motivation for “functionalizing” a program?

a) The divide-and-conquer approach makes program development more manageable. b) Software reusability—using existing building blocks to create new programs. c) Avoid repeating code. d) Execution performance—functionalized programs run faster.

Computer Science & Information Technology

Solutions with a pH in the bottom half of the pH scale are ____.

A. neutral B. acidic C. basic D. non-polar

Computer Science & Information Technology