____ maintains an integrated set of organization-wide security controls along with associated technical countermeasures.
A. Tactical security management
B. Strategic enterprise management
C. Tactical enterprise management
D. Strategic security management
Answer: D
You might also like to view...
With pointer variables, you can ________ manipulate data stored in other variables.
A) never B) seldom C) indirectly D) All of the above E) None of the above
How does WiMAX differ from Wi-Fi?
What will be an ideal response?
The ____ report gives you a detailed analysis of how money is being spent by task for each week of the project.
A. Task Expenses B. Cash Flow C. Expense Sheet D. Accounting
The major features of a DBMS include:
A. data security and integrity B. interactive query, data entry, and updating C. data independence and data storage management D. all of the above E. only A and B