Given the number of possible participants in the operations and maintenance process, the logical way to establish a formal security of operations function is through an organization-wide ____ activity.

A. enterprise continuity
B. data security
C. digital forensics
D. strategic planning


Answer: D

Computer Science & Information Technology

You might also like to view...

Under UNIX, __________ devices hold files.

a. character b. special c. disk d. block

Computer Science & Information Technology

If a child folder is inheriting its permissions from a parent folder, it could be said that the parent is propagating those permissions to the child

Indicate whether the statement is true or false

Computer Science & Information Technology

For a kiosk presentation, which of the following is an option?

A. action buttons B. navigation hyperlinks C. automatic timings D. All of the above.

Computer Science & Information Technology

Construct a data cube from Table 3.1. Is this a dense or sparse data cube? If it is sparse, identify the cells that are empty.

The data cube is shown in Table 3.2. It is a dense cube; only two cells are empty.

Computer Science & Information Technology