The proper development of a security policy is accomplished through what is called the ____.
A. software life cycle
B. data life cycle
C. assets policy cycle
D. security policy cycle
Answer: D
Computer Science & Information Technology
You might also like to view...
Expound on the points where terrorism and organized crime meet and divert
What will be an ideal response?
Computer Science & Information Technology
Apart from the free-form surfaces common to most computer aided design systems, what other kinds of free-form surfaces can you construct using Rhino?
What will be an ideal response?
Computer Science & Information Technology