At its core, the purpose of the personnel security function is to ____.
A. audit the actions of untrusted individuals
B. review the actions of trusted individuals
C. log the actions of untrusted individuals
D. monitor the actions of trusted individuals
Answer: D
You might also like to view...
What is a protocol suite, and what is the advantage of a suite?
What will be an ideal response?
____ images are resolution-independent and do not pixelate when resized.
a. Change Point b. Vector c. Bit d. All of the above
Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
Answer the following statement(s) true (T) or false (F)
What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?
A. chosen-ciphertext B. chosen-plaintext C. known plaintext D. ciphertext-only