__________ allows for major security control components to be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate.

A. System review
B. Project review
C. Program review
D. Application review


Answer: C

Computer Science & Information Technology

You might also like to view...

Referring to the figure above, the property name -ms-transform incorporates a(n) __________.

a. pseudo-class b. browser prefix c. pseudo-element d. class name

Computer Science & Information Technology

________ is the process of receiving, initial sorting, and prioritizing of information to facilitate its appropriate handling.

A. Incident B. Triage C. Constituency D. Handling

Computer Science & Information Technology

What is the combine step in the merge sort algorithm?

a. The merging step b. The partition step c. The sub-dividing the array step d. The removing duplicates step

Computer Science & Information Technology

To review two different documents containing revisions, both based on an original document, use:

A) Combine. B) Compare. C) Contrast. D) View Side by Side.

Computer Science & Information Technology