_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.

A. Preventative B. Supportive
C. Operational D. Detection and recovery


B. Supportive

Computer Science & Information Technology

You might also like to view...

Revise the parameterized constructor to call the base-class’s constructor instead of MagicBox’s constructor.

What will be an ideal response?

Computer Science & Information Technology

In a system in which it is possible for a deadlock to occur, under what circumstances would you use a deadlock detection algorithm?

What will be an ideal response?

Computer Science & Information Technology

COSO focuses on ________.

corporate internal and financial controls IT governance IT security governance All of these

Computer Science & Information Technology

The _________ is an actual network made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology