An IT security plan should include details of _________.
A. risks B. recommended controls
C. responsible personnel D. all of the above
Question 2
________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies.
A. Technical B. Preventative
C. Detection and recovery D. Management