The three steps for IT security management controls and implementation are: prioritize risks, respond to risks, and __________ .
Fill in the blank(s) with the appropriate word(s).
monitor risks
Computer Science & Information Technology
You might also like to view...
Numerical data is effectively presented in all of the following forms EXCEPT:
A) charts. B) tables. C) graphs. D) raw text.
Computer Science & Information Technology
One big difference of screen design from form design is the constant presence of a ________ on the screen.
A) cursor B) title C) command prompt D) voice prompt
Computer Science & Information Technology