In the case of every one of the EBK security functions, the ____ stage creates a framework of concrete security procedures and practices, which then serve as the basis for executing the process in the real world.
A. plan
B. execute
C. design
D. review
Answer: C
Computer Science & Information Technology
You might also like to view...
What are the three methods that a class that implements the Iterator interface must provide?
What will be an ideal response?
Computer Science & Information Technology
The Functions tab lists the messages that we can send to an object to access one of its ____.
A. procedures B. controls C. joints D. events
Computer Science & Information Technology