The aim of a(n) ____ is to obtain all of the evidence that is needed to understand intruder activity and then provide information for proceeding with remedial action.

A. audit
B. evaluation
C. assessment
D. review


Answer: A

Computer Science & Information Technology

You might also like to view...

The Calculated data type uses data from fields in the same report to perform calculations. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_______ is a commercially available hypervisor from VMware that provides users a bare metal hypervisor to host virtual machines on their servers.

A) Zygote B) Dalvi06B C) JVM D) ESXi

Computer Science & Information Technology

XHTML comments begin with