When organizations adopt security measures for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as __________.
A. baselining
B. best practices
C. benchmarking
D. standards of due care
Answer: D
Computer Science & Information Technology
You might also like to view...
The _____ lock indicator light on means numbers can be used from the numeric key pad
Fill in the blank(s) with correct word
Computer Science & Information Technology
A laser vacuum requires a special _____ vacuum bag
Fill in the blank(s) with correct word
Computer Science & Information Technology