The ____ should specify how the asset baselining, access control, status accounting, and data integrity functions will be carried out.

A. monitoring plan
B. compliance plan
C. evaluation plan
D. remediation plan


Answer: C

Computer Science & Information Technology

You might also like to view...

Suppose that we declare all of the database integrity constraints in the database schema so that the DBMS will not allow any transaction to commit if its updates violate any of the integrity constraints. Then, even if we do not use any concurrency control, the database always remains consistent. Explain why we must nevertheless use a concurrency control.

What will be an ideal response?

Computer Science & Information Technology

The __________ of a linked list points to the first node in the list.

a. starter b. head c. tail d. declaration e. None of these

Computer Science & Information Technology

Which of the following is the Telco end of a T1 demarc?

A. Smart jack B. Network tap C. Proxy server D. IDF

Computer Science & Information Technology

A web designer should always create pages for viewing by a diverse audience, including physically impaired and global users.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology