When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as __________.

A. baselining
B. best practices
C. benchmarking
D. standards of due care

Answer: D

Computer Science & Information Technology

You might also like to view...

The _____ lock indicator light on means numbers can be used from the numeric key pad

Fill in the blank(s) with correct word

Computer Science & Information Technology

A laser vacuum requires a special _____ vacuum bag

Fill in the blank(s) with correct word

Computer Science & Information Technology