_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.
A. Preventative B. Supportive
C. Operational D. Detection and recovery
B. Supportive
Computer Science & Information Technology
You might also like to view...
The ________tags surround the input elements.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
An HTML comment starts with ____________ and ends with ____________.
a) /*, */ b) c) <--, --> \ d)
Computer Science & Information Technology
The prefix ____ should be used for a Double variable.
A. dbl B. dub C. dou D. dob
Computer Science & Information Technology
Select the true statement from the list below
a. No single testing tool can automatically test for all web standards. b. Include as many people as possible when you conduct usability tests. c. Search engines listings are effective immediately after submission. d. None of the above statements are true
Computer Science & Information Technology