A ____ is conducted to locate potential weaknesses found within the company's internal controls.

A. security audit
B. security review
C. security classification
D. security testing


Answer: A

Computer Science & Information Technology

You might also like to view...

The operation for adding an item to a queue is called

A) requeue B) enqueue C) dequeue D) proqueue

Computer Science & Information Technology

Computers that use ________ are referred to as third-generation computers

Fill in the blank(s) with correct word

Computer Science & Information Technology

When one IIf function is used within another IIf function, they are referred to as nested IIf functions

Indicate whether the statement is true or false

Computer Science & Information Technology

?One note captures your ideas and schoolwork on any device so you can _____, _____, and _____.

A. ?stay organized B. ?share notes C. ?work with others on projects D. ?let others do your work for you.

Computer Science & Information Technology