List of questions
Related questions
Question 172 - CAP discussion
Which of the following processes is used to protect the data based on its secrecy, sensitivity, or confidentiality?
A.
Change Control
B.
Data Hiding
C.
Configuration Management
D.
Data Classification
Your answer:
0 comments
Sorted by
Leave a comment first