The specific role of ____ is to detect and then document each potential threat in order to ensure that a rational management decision is made about what to do about it.

A. security of operations
B. compliance
C. management of operations
D. review of operations


Answer: A

Computer Science & Information Technology

You might also like to view...

When a variable is declared in a(n) ____ statement at the beginning of a procedure, it has procedure scope and can be used by the entire procedure.

A. Dim B. New C. As D. Create

Computer Science & Information Technology

A data entry field where the particular type of information is supplied by the user

a. Static text b. Legacy control c. Content control

Computer Science & Information Technology

An XML schema that is attached to a workbook is called an element.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Tasks that do not require user interaction can be encapsulated in a(n)

a. Service b. Activity c. Intent d. Class

Computer Science & Information Technology