_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.
A. Configuration management control
B. IT security management
C. Detection and recovery control
D. Security compliance
B. IT security management
You might also like to view...
Set methods are commonly called ____________ because they typically change a value.
Fill in the blank(s) with the appropriate word(s).
The keyboard shortcut to move one column to the right is ________
Fill in the blank(s) with the appropriate word(s).
Batteries in mobile devices can explode in the right environment
Indicate whether the statement is true or false
?You might want to delete your browser history when you have been working on any of the following EXCEPT _____.
A. ?a public computer such as a a library B. ?a school lab computer C. ?your personal computer D. ?your friend's computer