Which of the following is the PRIMARY prerequisite to implementing data classification within an organization?
What mechanisms are used to identify deficiencies that would provide attackers with an opportunity to compromise a computer system?
Which of the following would be of GREATEST importance to the security manager in determining whether to accept residual risk?