Which of the following persons is responsible for testing and verifying whether the security
policy is properly implemented, and the derived security solutions are adequate or not?
A.
Data owner
B.
Data custodian
C.
User
D.
Auditor
Which of the following persons is responsible for testing and verifying whether the security
policy is properly implemented, and the derived security solutions are adequate or not?
Which of the following persons is responsible for testing and verifying whether the security
policy is properly implemented, and the derived security solutions are adequate or not?
A.
Data owner
B.
Data custodian
C.
User
D.
Auditor