Related questions
Question 143 - IIA-CIA-Part3 discussion
Which of the following IT-related activities is most commonly performed by the second line of defense?
A.
Block unauthorized traffic.
B.
Encrypt data.
C.
Review disaster recovery test results.
D.
Provide independent assessment of IT security.
Your answer:
0 comments
Sorted by
Leave a comment first