Which of the following is a guideline?

A. A document that states that user actions should be monitored
B. A document that mandates which user actions should be monitored
C. A document that covers exactly how to configure auditing
D. A document that covers how to handle security breaches


D

Explanation: A document that covers how to handle security breaches is a guideline. This is a general operational guide of recommended actions, but not usually a step-by-step guide.

Computer Science & Information Technology

You might also like to view...

The ___________________ attribute is used to uniquely identify an HTML element.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is Web analytics?

What will be an ideal response?

Computer Science & Information Technology

The key and certificate life cycle management concludes with the ____ phase.

A. issued B. registration C. certification D. cancellation

Computer Science & Information Technology

In the figure above, which number refers to a menu?

A. 1 B. 2 C. 3 D. 4

Computer Science & Information Technology