_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.

A. Configuration management control
B. IT security management
C. Detection and recovery control
D. Security compliance


B. IT security management

Computer Science & Information Technology

You might also like to view...

Set methods are commonly called ____________ because they typically change a value.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The keyboard shortcut to move one column to the right is ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Batteries in mobile devices can explode in the right environment

Indicate whether the statement is true or false

Computer Science & Information Technology

?You might want to delete your browser history when you have been working on any of the following EXCEPT _____.

A. ?a public computer such as a a library B. ?a school lab computer C. ?your personal computer D. ?your friend's computer

Computer Science & Information Technology