The follow-up stage of the management process includes _________.

A. maintenance of security controls
B. security compliance checking
C. incident handling
D. all of the above


D. all of the above

Computer Science & Information Technology

You might also like to view...

A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ order is the sequential advancing in a form from one field or control to the next

Fill in the blank(s) with correct word

Computer Science & Information Technology

Workbooks that enable multiple users on a network to view and make changes to the workbook at the same time are called shared ________

A) workbooks B) worksheets C) views D) programs

Computer Science & Information Technology

This lists the assets, liabilities, and the equity of an organization.

A. income statement B. payroll C. accounts payable D. balance sheet

Computer Science & Information Technology