Which of the following is a monitoring control that safeguards against the loss of integrity?

A) File integrity monitoring
B) Separation of duties
C) Encryption
D) Digital signatures


A) File integrity monitoring

Computer Science & Information Technology

You might also like to view...

A(n) _________ is a security-enhanced database in which the user and group permissions created by the Security Wizard are applied

Fill in the blank(s) with correct word

Computer Science & Information Technology

While using Flash Fill, make sure that:

A. ?you enter the desired pattern manually in at least five cells. B. ?the worksheet is in Print Preview. C. ?the data pattern includes at least one blank cell. D. ?you enter thedata pattern in the column right next to the related data.

Computer Science & Information Technology

Comodo's tree of certificate authorization has the root authorities at the top and issued certificates at the ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. If 5 items are added to a stack, the first item to be removed from the stack is the first item that was added to the stack. 2. A stack has a first in, first out property. 3. The peek operation of the ADT stack changes the stack.

Computer Science & Information Technology