The role of the ____ part of the security process is to ensure that the selected approach represents the most effective security response, as well as the greatest cost benefit for the organization as a whole.

A. plan
B. evaluate
C. management
D. design

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following file types increases the database size byte for byte when attached in Access?

A) Word and Excel files B) Word and JPEG files C) JPEG and other photo formats D) Excel and JPEG files

Computer Science & Information Technology

What do programmers call the process of identifying and correcting syntactical errors in a program?

A) fixing B) compiling C) interpreting D) debugging

Computer Science & Information Technology