The GREATEST benefit resulting from well-documented information security procedures is that they:
A. ensure that security policies are consistently applied.
B. ensure that critical processes can be followed by temporary staff.
C. facilitate security training of new staff.
D. provide a basis for auditing security practices.
A. ensure that security policies are consistently applied.
B. ensure that critical processes can be followed by temporary staff.
C. facilitate security training of new staff.
D. provide a basis for auditing security practices.