____ access controls remedy a circumstance or mitigate the damage caused during an incident.

A. Corrective
B. Detective
C. Deterrent
D. Preventive


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following class members should usually be private?

a) methods b) constructors c) variables d) All of the above

Computer Science & Information Technology

Upon opening Access, the right side of the screen displays Objects

Indicate whether the statement is true or false

Computer Science & Information Technology

Use the href element to create a link

Indicate whether the statement is true or false

Computer Science & Information Technology

Which hardware device connects your network to the Internet?

A. Modem B. Hub C. Firewall D. Switch

Computer Science & Information Technology