An information security manager finds a legacy application has no defined data owner. Of the following, who would be MOST helpful in identifying the appropriate data owner?
A.
The individual responsible for providing support for the application
B.
The individual who manages the process supported by the application
C.
The individual who manages users of the application
D.
The individual who has the most privileges within the application
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ServerBrain
2 months, 1 week agooluchecpoint
10 months, 3 weeks agoAgamennore
1 year, 3 months agochanke
1 year, 6 months agorichck102
1 year, 6 months agoMyKasala
1 year, 11 months agoMyKasala
1 year, 11 months agoMyKasala
1 year, 11 months ago