The privacy specialist documents and maintains records of all ____ practices used to protect personal data.
A. data-based
B. risk-based
C. control-based
D. threat-based
Answer: B
Computer Science & Information Technology
You might also like to view...
Big O notation describes ________.
a. the amount of memory required by an algorithm. b. the difficulty of writing an algorithm to solve a specific problem. c. an algorithm’s efficiency in terms of the work required to solve a problem. d. the length of an algorithm for solving a specific problem.
Computer Science & Information Technology
What type of grid would you normally use for term papers?
A) One-column B) Two-column C) Right-column D) Left-column
Computer Science & Information Technology
Instant messaging (IM) is a secure method of electronic communication
Indicate whether the statement is true or false
Computer Science & Information Technology
Which type of cable has only two twisted pairs?
a. UTP b. Coaxial c. POTS line d. Fiber
Computer Science & Information Technology