_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.

A. Preventative B. Supportive

C. Operational D. Detection and recovery


B. Supportive

Computer Science & Information Technology

You might also like to view...

The ________tags surround the input elements.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An HTML comment starts with ____________ and ends with ____________.

a) /*, */ b) c) <--, --> \ d)

Computer Science & Information Technology

The prefix ____ should be used for a Double variable.

A. dbl B. dub C. dou D. dob

Computer Science & Information Technology

Select the true statement from the list below

a. No single testing tool can automatically test for all web standards. b. Include as many people as possible when you conduct usability tests. c. Search engines listings are effective immediately after submission. d. None of the above statements are true

Computer Science & Information Technology