The proper development of a security policy is accomplished through what is called the ____.

A. software life cycle
B. data life cycle
C. assets policy cycle
D. security policy cycle

Answer: D

Computer Science & Information Technology

You might also like to view...

Expound on the points where terrorism and organized crime meet and divert

What will be an ideal response?

Computer Science & Information Technology

Apart from the free-form surfaces common to most computer aided design systems, what other kinds of free-form surfaces can you construct using Rhino?

What will be an ideal response?

Computer Science & Information Technology