________ controls discover unwanted events.
a. preventive
b. corrective
c. detective
d. mitigating
e. backup
Answer: a. preventive
Computer Science & Information Technology
You might also like to view...
____ is the detailed specification of how all the parts of a system will be implemented and coordinated.
A. System detailing B. System design C. Program detailing D. Program design
Computer Science & Information Technology
L2TP uses ____ rather than MPPE to encrypt data sent over PPP.
A. SSL B. SSH C. IPSec D. IKE
Computer Science & Information Technology
A comment can be deleted by right-clicking the comment balloon and clicking Delete Comment.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Describe separation of concerns in your own words
What will be an ideal response?
Computer Science & Information Technology