_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.

a. Configuration management control
b. IT security management
c. Detection and recovery control
d. Security compliance

b. IT security management

Computer Science & Information Technology

You might also like to view...

During what phase of the electronic discovery reference model does an organization ensure that potentially discoverable information is protected against alteration or deletion?

A. Identification B. Preservation C. Collection D. Production

Computer Science & Information Technology

The ____________________ is the height of a sound wave.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology