The main problem with the ____ approach is the sheer volume of data that the system logs produce.

A. audit-based
B. review-based
C. change-based
D. control-based


Answer: A

Computer Science & Information Technology

You might also like to view...

Suppose we want a constructor for a class that does nothing, and we will never want to write a constructor that does something. It is good programming practice to:

A. write a constructor that does nothing (has no parameters and no lines of code in its function block) B. leave the constructor out, because the same type of constructor will be supplied by the compiler automatically C. make a null constructor D. make a constructor that sets all integer data members to 0

Computer Science & Information Technology

The hostname utility (Sobell, page 53) displays the name of the system you are working on. Use hostname to display the name of the system you are working on.

What will be an ideal response?

Computer Science & Information Technology

A worksheet of faculty members at your university contains these columns in this sequence: Rank, Last Name, First Name, Department, and Salary. What is the first step to subtotal departmental salaries?

A) Sort by Salary B) Sort by Department C) Sort by Last Name D) Sort by Rank

Computer Science & Information Technology

_________ is a formal process to ensure that critical assets are sufficiently protected in a cost-effective manner.

a. Configuration management control b. IT security management c. Detection and recovery control d. Security compliance

Computer Science & Information Technology