The ____ should specify how the asset baselining, access control, status accounting, and data integrity functions will be carried out.

A. monitoring plan
B. compliance plan
C. evaluation plan
D. remediation plan

Answer: C

Computer Science & Information Technology

You might also like to view...

To access an array element, use the array name and the element's

A) name. B) data type. C) value. D) subscript. E) size declarator.

Computer Science & Information Technology

Which technique can be used to read PINs entered at ATMs or at other areas when a pin code is entered?

A. shoulder surfing B. footprinting C. zone transferring D. piggybacking

Computer Science & Information Technology