____ audit processes use event logs, critical system files, and other evidence-based means to identify exploits that an automated system cannot recognize.
A. System-based
B. Human-based
C. Hybrid
D. Control-based
Answer: B
Computer Science & Information Technology
You might also like to view...
List four types of ambiguous organizational schemes and explain them.
What will be an ideal response?
Computer Science & Information Technology
Mozilla supports two styles for applying shadows to objects: the Shadow filter and the DropShadow filter.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Full Screen Reading view shows text on the screen in a format that is easy to read and hides the Ribbon.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
If the Wi-Fi connection on a laptop isn't working, there might be a push button or key combination you can use to turn it on
Indicate whether the statement is true or false
Computer Science & Information Technology