A security audit tests to ensure that the proper ____ and procedures are in place to handle a potential vulnerability.
A. people
B. resources
C. policies
D. logs
Answer: C
Computer Science & Information Technology
You might also like to view...
Define vector graphic and bitmap graphic, and explain the characteristics of each.
What will be an ideal response?
Computer Science & Information Technology
A color scheme in Word is a document theme that identifies 24 complementary colors for text, background, accents, and links in a document.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
To import a text file into Excel with all the text import features, click the ________ tab
A) New B) Options C) Data D) Info
Computer Science & Information Technology
A Submit button is also called a Press button.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology