Certified Authorization Professional – CAP – Question114

Which of the following approaches can be used to build a security program? Each correct answer represents a complete solution. Choose all that apply.

A.
Bottom-Up Approach
B. Right-Up Approach
C. Top-Down Approach
D. Left-Up Approach

Correct Answer: AC