____ maintains an integrated set of organization-wide security controls along with associated technical countermeasures.

A. Tactical security management
B. Strategic enterprise management
C. Tactical enterprise management
D. Strategic security management


Answer: D

Computer Science & Information Technology

You might also like to view...

With pointer variables, you can ________ manipulate data stored in other variables.

A) never B) seldom C) indirectly D) All of the above E) None of the above

Computer Science & Information Technology

How does WiMAX differ from Wi-Fi?

What will be an ideal response?

Computer Science & Information Technology

The ____ report gives you a detailed analysis of how money is being spent by task for each week of the project.

A. Task Expenses B. Cash Flow C. Expense Sheet D. Accounting

Computer Science & Information Technology

The major features of a DBMS include:

A. data security and integrity B. interactive query, data entry, and updating C. data independence and data storage management D. all of the above E. only A and B

Computer Science & Information Technology