What type of access control is intended to discover unwanted or unauthorized activity by providing information after the event has occurred?
A. Preventive
B. Corrective
C. Detective
D. Directive
Answer: C. Detective
Computer Science & Information Technology
You might also like to view...
Using Datalog, express the “bill of materials” query described in Exercise 13.21.
What will be an ideal response?
Computer Science & Information Technology
The name of the file on the disk can be changed using the rename function.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
scopes.
a. auto. b. register. c. static. d. extern.
Computer Science & Information Technology
Discuss some of the primary or more common constraints with project resources.
What will be an ideal response?
Computer Science & Information Technology