The ____ level of the capability maturity process establishes security training as a continuous process.
A. formal practice
B. deliberate control
C. informal practice
D. security management
Answer: D
Computer Science & Information Technology
You might also like to view...
Where possible, determine the number of significant digits for the following numbers:
250000
Computer Science & Information Technology
The ________ command enables you to specify rows and columns that will be duplicated on each printed page
Fill in the blank(s) with correct word
Computer Science & Information Technology
A queue would be a good data structure to use for keeping track of documents waiting to be printed on a networked printer.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
PowerPoint lets you insert pictures in many file formats, including JPEG, PNG, GIF, TIFF, and BMP.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology