The privacy specialist documents and maintains records of all ____ practices used to protect personal data.
A. data-based
B. risk-based
C. control-based
D. threat-based
Answer: B
Computer Science & Information Technology
You might also like to view...
You can use the RemoveIt method to remove the dashes from a Social Security number, the leading zeroes from a policy number, or the middle initial from a name.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
On an Android device, user can send commands to the operating system using a touch screen. The standard graphical user interface recognizes ____ primary gestures.
A. three B. five C. seven D. nine
Computer Science & Information Technology