Which of the following is an example of compensating control?

A.. An insurance policy
B. A padlock on a gate
C. A chain on the hotel room door
D. A red bucket of sand with the word, "Fire"


Answer: C. A chain on the hotel room door

Computer Science & Information Technology

You might also like to view...

A file of 4096 blocks is to be sorted with an available buffer space of 64 blocks. How many passes will be needed in the merge phase of the external sort-merge algorithm?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?

A. Ingress filtering B. Data authentication C. Network sniffing D. Spoofing

Computer Science & Information Technology

A natural language search will use which of the following characters?

A) " B) ] C) < D) >

Computer Science & Information Technology

When creating a chart from data in a worksheet, the legend data is indicated by ________

A) shading the data with a light purple background B) surrounding the data with a purple border C) changing font color of the data to red D) surrounding the data with a red dashed border

Computer Science & Information Technology