_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.
A. Preventative B. Supportive
C. Operational D. Detection and recovery
B. Supportive
Computer Science & Information Technology
You might also like to view...
Revise the parameterized constructor to call the base-class’s constructor instead of MagicBox’s constructor.
What will be an ideal response?
Computer Science & Information Technology
In a system in which it is possible for a deadlock to occur, under what circumstances would you use a deadlock detection algorithm?
What will be an ideal response?
Computer Science & Information Technology
COSO focuses on ________.
corporate internal and financial controls IT governance IT security governance All of these
Computer Science & Information Technology
The _________ is an actual network made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology