The ____ develops the necessary control set to ensure that risks to personal data are controlled.
A. privacy specialist
B. incident specialist
C. control specialist
D. threat specialist
Answer: A
Computer Science & Information Technology
You might also like to view...
The disaster recovery team must consider the impact from any ________ in the data that may occur between the time of the backup and the end of local processing
Fill in the blank(s) with correct word
Computer Science & Information Technology
A statement invoking a constructor should also use the Java keyword ______.
a) class b) return c) public d) new
Computer Science & Information Technology