Which of the following statements best describes trusted recovery controls?
A. Used to track and approve changes to a system
B. Ensures security is not breached when a computer system crashes
C. Preserves the state of the system before the crash and prevent further damage
D. Used to clearly mark and handle assets
Answer: B
Explanation: Trusted recovery controls ensure security is not breached when a computer system crashes.
You might also like to view...
All methods require at least one argument.
Answer the following statement true (T) or false (F)
Case-Based Critical Thinking Questions ? Case 3-2 In PowerPoint 2016, Bella is learning how to merge shapes. She has merged one shape with the help of a co-worker, and is now ready to try it on her own. To merge shapes, Bella knows that she must first select _____.
A. 1 or more shapes B. 2 or more shapes C. 3 or more shapes D. 4 or more shapes
Since the days when storage devices were first made available to the public, they have now become _____.
a. more expensive and have greater capacity b. more affordable and have smaller capacity c. physically smaller with greater storage capacity d. physically larger and faster
Zero-day attacks might be stopped by ________ detection.
signature anamoly both anomaly and signature active