SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

Reviewer (ITEC - Lesson 1)

» Start this Course
(Practice similar questions for free)
Question:

Concentrates on defining security controls, policies, and mechanisms to protect the organization's information and technology assets.

Author: Marjorie Suarez



Answer:

Security Architecture


0 / 5  (0 ratings)

1 answer(s) in total