The ____ level of the capability maturity process establishes security training as a continuous process.

A. formal practice
B. deliberate control
C. informal practice
D. security management


Answer: D

Computer Science & Information Technology

You might also like to view...

Where possible, determine the number of significant digits for the following numbers:

250000

Computer Science & Information Technology

The ________ command enables you to specify rows and columns that will be duplicated on each printed page

Fill in the blank(s) with correct word

Computer Science & Information Technology

A queue would be a good data structure to use for keeping track of documents waiting to be printed on a networked printer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

PowerPoint lets you insert pictures in many file formats, including JPEG, PNG, GIF, TIFF, and BMP.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology