Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _________ process.
A. management B. security awareness and training
C. maintenance D. all of the above
A. management
Computer Science & Information Technology