When should security be implemented or included in the asset life cycle?
A. During the maintaining phase
B. As early as possible
C. Once the asset is being used in daily operations
D. Before implementation
Answer: B. As early as possible
Computer Science & Information Technology
You might also like to view...
The _____ feature maintains all deleted, changed, and inserted text for a document.
A. Comments B. Changes C. Track Changes D. Tracking
Computer Science & Information Technology
The ________ keyboard layout gets its name from the first six letters in the top-left row of alphabetic keys on the keyboard and is the most common English-language keyboard layout.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology