Because security-in-depth has been adopted as a goal of your company, a security analyst was hired to complete a security audit. During the audit, the security analyst recommended that your company periodically create server images for storage at an offsite location. Of which type of controls are these images?

A. Administrative control
B. Technical control
C. Physical control
D. Corrective control
E. Preventive control
F. Recovery control
G. Statements b and d only
H. Statements a and e only
I. Statements c and f only


G

Explanation: Server images are technical, corrective controls.

Computer Science & Information Technology

You might also like to view...

Write a Perl program that counts the number of files in the working direc- tory and the number of bytes in those files, by filename extension.

What will be an ideal response?

Computer Science & Information Technology

When Access is started, the opening Microsoft Office Access window displays and is divided into ________ section(s)

A) one B) two C) three D) four

Computer Science & Information Technology

You must take care to ensure that your customers' personally identifiable and payment information is transmitted securely across a payment gateway and is secure from hackers who might breach your Web site.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When keying a business letter using the Word defaults, remove the extra space between the lines of the letter address and the writer's name and title if on two lines.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology