Which of the following processes is used to protect the data based on its secrecy, sensitivity, or confidentiality?

Which of the following processes is used to protect the data based on its secrecy, sensitivity, or confidentiality?

Which of the following processes is used to protect the data based on its secrecy, sensitivity, or confidentiality?

A.
Change Control

B.
Data Hiding

C.
Configuration Management

D.
Data Classification



Leave a Reply 0

Your email address will not be published. Required fields are marked *