What process describes using technology as a basis for controlling the access and usage of sensitive data?
A. technical controls
B. administrative controls
C. control diversity
D. vendor diversity
Answer: A
You might also like to view...
Paper output from a printer is known as _____.
Fill in the blank(s) with the appropriate word(s).
List five of the several measures an analyst can take to improve the security, privacy, and confidentiality of data, systems, networks, individuals, and organizations that use ecommerce Web applications.
What will be an ideal response?
An error such as attempting to divide by zero during runtime will always throw an exception.
Answer the following statement true (T) or false (F)
A new class of objects can be created quickly and conveniently by ________—the new class absorbs the characteristics of an existing one, possibly customizing them and adding unique characteristics of its own.
a. customization. b. inheritance. c. copying. d. None of the above.