Maintenance of security controls, security compliance checking, change and configuration management, and incident handling are all included in the follow-up stage of the _________ process.

A. management B. security awareness and training
C. maintenance D. all of the above

A. management

Computer Science & Information Technology

You might also like to view...

How many reporting tools does Access 2016 provide?

A) Eleven B) Four C) Five D) Six

Computer Science & Information Technology

You use the ____________________ property to name a control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology