The three steps for IT security management controls and implementation are: prioritize risks, respond to risks, and __________ .

Fill in the blank(s) with the appropriate word(s).

monitor risks

Computer Science & Information Technology

You might also like to view...

Numerical data is effectively presented in all of the following forms EXCEPT:

A) charts. B) tables. C) graphs. D) raw text.

Computer Science & Information Technology

One big difference of screen design from form design is the constant presence of a ________ on the screen.

A) cursor B) title C) command prompt D) voice prompt

Computer Science & Information Technology