Which of the following is an example of compensating control?
A.. An insurance policy
B. A padlock on a gate
C. A chain on the hotel room door
D. A red bucket of sand with the word, "Fire"
Answer: C. A chain on the hotel room door
You might also like to view...
A file of 4096 blocks is to be sorted with an available buffer space of 64 blocks. How many passes will be needed in the merge phase of the external sort-merge algorithm?
What will be an ideal response?
Which of the following is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?
A. Ingress filtering B. Data authentication C. Network sniffing D. Spoofing
A natural language search will use which of the following characters?
A) " B) ] C) < D) >
When creating a chart from data in a worksheet, the legend data is indicated by ________
A) shading the data with a light purple background B) surrounding the data with a purple border C) changing font color of the data to red D) surrounding the data with a red dashed border