The role of the ____ part of the security process is to ensure that the selected approach represents the most effective security response, as well as the greatest cost benefit for the organization as a whole.
A. plan
B. evaluate
C. management
D. design
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following file types increases the database size byte for byte when attached in Access?
A) Word and Excel files B) Word and JPEG files C) JPEG and other photo formats D) Excel and JPEG files
Computer Science & Information Technology
What do programmers call the process of identifying and correcting syntactical errors in a program?
A) fixing B) compiling C) interpreting D) debugging
Computer Science & Information Technology