
微信扫一扫
实时资讯全掌握
Which of the following represents the procedure managers use to identify whether the company has information that unauthorized individuals want, how these individuals could obtain the information, the value of the information, and the probability of unauthorized access occurring? A. Test of controls. B. Risk assessment. C. Systems assessment. D. Disaster recovery plan assessment. |