Which of the following should be included in an audit report?

A) Any security vulnerabilities found
B) The machines affected by these vulnerabilities
C) Recommended steps to correct the vulnerabilities
D) All of the above


D) All of the above

Computer Science & Information Technology

You might also like to view...

A collection of worksheets is called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

MP3 players are also referred to as ________ media players because they allow you to carry songs and podcasts with you

Fill in the blank(s) with correct word

Computer Science & Information Technology

All of the following are examples of malware, EXCEPT ________

A) worms B) spam C) viruses D) spyware

Computer Science & Information Technology

Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of personal information.

A. privacy B. protection C. security D. guarding

Computer Science & Information Technology