____ access controls remedy a circumstance or mitigate the damage caused during an incident.
A. Corrective
B. Detective
C. Deterrent
D. Preventive
Answer: A
Computer Science & Information Technology
You might also like to view...
Which of the following class members should usually be private?
a) methods b) constructors c) variables d) All of the above
Computer Science & Information Technology
Upon opening Access, the right side of the screen displays Objects
Indicate whether the statement is true or false
Computer Science & Information Technology
Use the href element to create a link
Indicate whether the statement is true or false
Computer Science & Information Technology
Which hardware device connects your network to the Internet?
A. Modem B. Hub C. Firewall D. Switch
Computer Science & Information Technology