List of questions
Related questions
Question 36 - CIPM discussion
Which statement is FALSE regarding the use of technical security controls?
A.
Technical security controls are part of a data governance strategy.
B.
Technical security controls deployed for one jurisdiction often satisfy another jurisdiction.
C.
Most privacy legislation lists the types of technical security controls that must be implemented.
D.
A person with security knowledge should be involved with the deployment of technical security controls.
Your answer:
0 comments
Sorted by
Leave a comment first