ISC Exam Questions

Which of the following processes is used to protect the data based on its secrecy, sensitivity, or c

Which of the following processes is used to protect the data based on its secrecy, sensitivity, or confidentiality?

A.
Change Control

B.
Data Hiding

C.
Configuration Management

D.
Data Classification