Which of the following is not one of the three risk management activities in the security management process?

A) Protections
B) Analysis
C) Measures
D) Plan

B) Analysis

Computer Science & Information Technology

You might also like to view...

________ software blocks unauthorized access to your computer

A) Antivirus B) Anti-spam C) Gateway D) Firewall

Computer Science & Information Technology

Function __________ searches for the first occurrence in its first string argument of any character in its second string argument.

a) strfirst b) strstr c) firstany d) strpbrk

Computer Science & Information Technology