____ audit processes use event logs, critical system files, and other evidence-based means to identify exploits that an automated system cannot recognize.

A. System-based
B. Human-based
C. Hybrid
D. Control-based


Answer: B

Computer Science & Information Technology

You might also like to view...

List four types of ambiguous organizational schemes and explain them.

What will be an ideal response?

Computer Science & Information Technology

Mozilla supports two styles for applying shadows to objects: the Shadow filter and the DropShadow filter.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Full Screen Reading view shows text on the screen in a format that is easy to read and hides the Ribbon.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If the Wi-Fi connection on a laptop isn't working, there might be a push button or key combination you can use to turn it on

Indicate whether the statement is true or false

Computer Science & Information Technology