Which of the following is not one of the three risk management activities in the security management process?
A) Protections
B) Analysis
C) Measures
D) Plan
B) Analysis
Computer Science & Information Technology
You might also like to view...
________ software blocks unauthorized access to your computer
A) Antivirus B) Anti-spam C) Gateway D) Firewall
Computer Science & Information Technology
Function __________ searches for the first occurrence in its first string argument of any character in its second string argument.
a) strfirst b) strstr c) firstany d) strpbrk
Computer Science & Information Technology