Which of the following is a guideline?
A. A document that states that user actions should be monitored
B. A document that mandates which user actions should be monitored
C. A document that covers exactly how to configure auditing
D. A document that covers how to handle security breaches
D
Explanation: A document that covers how to handle security breaches is a guideline. This is a general operational guide of recommended actions, but not usually a step-by-step guide.
You might also like to view...
The ___________________ attribute is used to uniquely identify an HTML element.
Fill in the blank(s) with the appropriate word(s).
What is Web analytics?
What will be an ideal response?
The key and certificate life cycle management concludes with the ____ phase.
A. issued B. registration C. certification D. cancellation
In the figure above, which number refers to a menu?
A. 1 B. 2 C. 3 D. 4