Which type of controls are software or hardware components used to restrict access?
A. logical controls
B. physical controls
C. preventive controls
D. administrative controls
A
Explanation: Logical or technical controls are software or hardware components used to restrict access.
You might also like to view...
Write code that sets each element of a boolean array called flags to alternating values (true at index 0, false at index 1, etc.).
What will be an ideal response?
The #NAME? error normally appears when a nonexistent function name is used
Indicate whether the statement is true or false
Assuming the priority queue is implemented as a heap, the first step is to insert the new element in the ____ available position in the list.
A. smallest B. largest C. first D. last
When setting up a mail merge document to prepare a listing of member names, phone numbers, and other contact information, select ____ as the type of document.
A. Directory B. Envelopes C. Labels D. Letters