Information security risk management is driven by ____.

A. process
B. evaluation
C. controls
D. information

Answer: D

Computer Science & Information Technology

You might also like to view...

The __________ search method is a good way to search a large amount of data for a search key.

Fill in the blank(s) with correct word

Computer Science & Information Technology

The process of planning a computer program begins with a problem statement that clearly defines the program's purpose.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology