As part of your company's comprehensive security program, the security auditor periodically reviews the audit logs to determine if any new controls need to be implemented. This an example of which type of control?

A. Administrative control
B. Technical control
C. Physical control
D. Detective control
E. Preventive control
F. Recovery control
G. Statements b and d only
H. Statements a and e only
I. Statements c and f only


G

Explanation: Audit logs are an example of a technical, detective control.

Computer Science & Information Technology

You might also like to view...

When you pass a pointer as an argument to a function, you must

a. declare the pointer value again in the function call b. dereference the pointer value in the function prototype c. use the #include state-ment d. not dereference the pointer in the function's body e. None of these

Computer Science & Information Technology

Why can’t binary data be represented directly in XML, for example, by representing it as Unicode byte values? XML elements can carry strings represented as base64. Discuss the advantages or disadvantages of using this method to represent binary data.

What will be an ideal response?

Computer Science & Information Technology

Are the destructors inherited by the derived class?

A. Yes B. No

Computer Science & Information Technology

When ____ is selected in the Word Options dialog box, the options available affect the spelling and grammar checker.

A. Proofing B. Editing C. Spelling and Grammar checking D. Words

Computer Science & Information Technology