At its core, the purpose of the personnel security function is to ____.

A. audit the actions of untrusted individuals
B. review the actions of trusted individuals
C. log the actions of untrusted individuals
D. monitor the actions of trusted individuals


Answer: D

Computer Science & Information Technology

You might also like to view...

What is a protocol suite, and what is the advantage of a suite?

What will be an ideal response?

Computer Science & Information Technology

____ images are resolution-independent and do not pixelate when resized.

a. Change Point b. Vector c. Bit d. All of the above

Computer Science & Information Technology

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.

Answer the following statement(s) true (T) or false (F)

Computer Science & Information Technology

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?

A. chosen-ciphertext B. chosen-plaintext C. known plaintext D. ciphertext-only

Computer Science & Information Technology