Question 172:
Which of the following processes is used to protect the data based on its secrecy, sensitivity, or confidentiality?
Answer options:
A. Change Control B. Data Hiding C. Configuration Management D. Data Classification
Answer correct:
D