________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies.

A. Technical B. Preventative
C. Detection and recovery D. Management


C. Detection and recovery

Computer Science & Information Technology

You might also like to view...

Name three goals for well-written software.

What will be an ideal response?

Computer Science & Information Technology

Convert the following 8-bit binary number to decimal: 10010011.

Computer Science & Information Technology

Filters are applied from the Filters section of the Property ____.

A. organizer B. inspector C. manager D. agent

Computer Science & Information Technology

To insert the AVERAGE function into a cell, click the cell, click the Function Options list arrow in the Editing group on the Home tab, and then click Average. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology