_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.
a. Configuration management control
b. IT security management
c. Detection and recovery control
d. Security compliance
b. IT security management
Computer Science & Information Technology
You might also like to view...
During what phase of the electronic discovery reference model does an organization ensure that potentially discoverable information is protected against alteration or deletion?
A. Identification B. Preservation C. Collection D. Production
Computer Science & Information Technology
The ____________________ is the height of a sound wave.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology