Question 74:
Which of the following approaches can be used to build a security program Each correct answer represents a complete solution. Choose all that apply.
Answer options:
A. Right-Up Approach B. Left-Up Approach C. Bottom-Up Approach D. Top-Down Approach