Which of the following should be included in an audit report?
A) Any security vulnerabilities found
B) The machines affected by these vulnerabilities
C) Recommended steps to correct the vulnerabilities
D) All of the above
D) All of the above
You might also like to view...
A collection of worksheets is called a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
MP3 players are also referred to as ________ media players because they allow you to carry songs and podcasts with you
Fill in the blank(s) with correct word
All of the following are examples of malware, EXCEPT ________
A) worms B) spam C) viruses D) spyware
Information ____ refers to the right of individuals and companies to deny or restrict the collection and use of personal information.
A. privacy B. protection C. security D. guarding