What are the functions that can be used to classify access controls?

What will be an ideal response?


Preventive-help the organization avoid an incident
Deterrent-discourage or deter an incident from occurring
Detective-detect or identify an incident or threat when it occurs
Corrective-remedy a circumstance or mitigate the damage caused during an incident
Recovery-restore operating conditions to normal
Compensating-use alternate controls to resolve shortcomings1

Computer Science & Information Technology

You might also like to view...

A ________ is used to indicate that an exit effect has been applied to an animation

A) green square B) blue star C) red star D) yellow square

Computer Science & Information Technology

The char data type is used to store multiple characters.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Press the down arrow key to move the insertion point to the next cell in a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is invalid statement?

A) Sheet tabs can be colored B) Some picture can be applied as a background of a sheet C) You can set the column width automatically fit the amount of text D) The width of a row and be specified manually or fit automatically

Computer Science & Information Technology