________ controls discover unwanted events.

a. preventive
b. corrective
c. detective
d. mitigating
e. backup


Answer: a. preventive

Computer Science & Information Technology

You might also like to view...

____ is the detailed specification of how all the parts of a system will be implemented and coordinated.

A. System detailing B. System design C. Program detailing D. Program design

Computer Science & Information Technology

L2TP uses ____ rather than MPPE to encrypt data sent over PPP.

A. SSL B. SSH C. IPSec D. IKE

Computer Science & Information Technology

A comment can be deleted by right-clicking the comment balloon and clicking Delete Comment.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Describe separation of concerns in your own words

What will be an ideal response?

Computer Science & Information Technology