____ is a continuous process when it comes to ensuring the integrity of the security system.

A. Evaluation
B. Oversight
C. Management
D. Review


Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) ____________ is any device that works with binary data.

a. electronic module b. digital device c. binary machine d. computational tool

Computer Science & Information Technology

Macros that can be used maliciously to erase or damage files are known as:

A) macro viruses. B) macro bugs. C) macro worms. D) VBA.

Computer Science & Information Technology

Which of the following statements about checklists testing is true?

A. It is considered a true/false test. B. It is a passive type of test. C. During the test key personnel performs a dry run of the emergency. D. Members of the key business units meet to trace their steps through the plan.

Computer Science & Information Technology

Biometric practices in wide use today fall into one of two groups: identification or security.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology