Because security-in-depth has been adopted as a goal of your company, a security analyst was hired to complete a security audit. During the audit, the security analyst suggests that your company adopt a companywide security policy. Of which type of controls is this policy?

A. Administrative control
B. Technical control
C. Physical control
D. Corrective control
E. Preventive control
F. Recovery control
G. Statements b and d only
H. Statements a and e only
I. Statements c and f only


H

Explanation: Security policies are administrative, preventive controls.

Computer Science & Information Technology

You might also like to view...

Purchases in most large corporations involve a ____.

A. procurement chain B. control chain C. resource chain D. supply chain

Computer Science & Information Technology

____ language forces programming to explicitly identify a variable's data type.

A. Strongly typed B. Mildly typed C. Weakly typed D. Mime typed

Computer Science & Information Technology

HTTP basic authentication relies on environment variables set by:

a. the MySQL storage engine b. the PHP engine c. the SSL certificate d. the web server

Computer Science & Information Technology

Draw a flowchart for the program fragments (no need to show start and stop)

``` IF value = 0 OUTPUT "Value equals zero" ELSE OUTPUT "Value not zero" END 1F ```

Computer Science & Information Technology