Because security-in-depth has been adopted as a goal of your company, a security analyst was hired to complete a security audit. During the audit, the security analyst suggests that your company adopt a companywide security policy. Of which type of controls is this policy?
A. Administrative control
B. Technical control
C. Physical control
D. Corrective control
E. Preventive control
F. Recovery control
G. Statements b and d only
H. Statements a and e only
I. Statements c and f only
H
Explanation: Security policies are administrative, preventive controls.
You might also like to view...
Purchases in most large corporations involve a ____.
A. procurement chain B. control chain C. resource chain D. supply chain
____ language forces programming to explicitly identify a variable's data type.
A. Strongly typed B. Mildly typed C. Weakly typed D. Mime typed
HTTP basic authentication relies on environment variables set by:
a. the MySQL storage engine b. the PHP engine c. the SSL certificate d. the web server
Draw a flowchart for the program fragments (no need to show start and stop)
``` IF value = 0 OUTPUT "Value equals zero" ELSE OUTPUT "Value not zero" END 1F ```