The ____ should specify how the asset baselining, access control, status accounting, and data integrity functions will be carried out.
A. monitoring plan
B. compliance plan
C. evaluation plan
D. remediation plan
Answer: C
Computer Science & Information Technology
You might also like to view...
To access an array element, use the array name and the element's
A) name. B) data type. C) value. D) subscript. E) size declarator.
Computer Science & Information Technology
Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?
A. shoulder surfing B. footprinting C. zone transferring D. piggybacking
Computer Science & Information Technology