Because security-in-depth has been adopted as a goal of your company, a security analyst was hired to complete a security audit. During the audit, the security analyst suggests that your company's data center be protected by implementing biometrics. Of which type of controls is this data center protection?

A. Administrative control
B. Technical control
C. Physical control
D. Corrective control
E. Preventive control
F. Recovery control
G. Statements b and d only
H. Statements a and f only
I. Statements c and e only


I

Explanation: Biometrics are an example of a physical, preventive control.

Computer Science & Information Technology

You might also like to view...

Describe the purpose of adding a join line in a multi-table query

What will be an ideal response?

Computer Science & Information Technology

A continue statement can not be included in a switch statement.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

HTML stands for ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A user tells you that Microsoft Word gives errors when saving a file. What should you do next?

a. Install Windows updates that also include patches for Microsoft Word. b. Ask the user when the problem first started. c. Ask the user to save the error message as a screenshot the next time the error occurs and email it to you. d. Use Task Manager to end the Microsoft Word program.

Computer Science & Information Technology