Which of the following is a key advantage of the bottom-up approach to security implementation?
A. strong upper-management support
B. a clear planning and implementation process
C. utilizing the technical expertise of the individual administrators
D. coordinated planning from upper management
Answer: C
Computer Science & Information Technology
You might also like to view...
A watermark will not display in ________ view
Fill in the blank(s) with correct word
Computer Science & Information Technology
________ is the name of the massive public online ledger which records the time and amount of every finalized cryptocurrency transaction.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology