What process describes using technology as a basis for controlling the access and usage of sensitive data?

A. technical controls
B. administrative controls
C. control diversity
D. vendor diversity


Answer: A

Computer Science & Information Technology

You might also like to view...

Paper output from a printer is known as _____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

List five of the several measures an analyst can take to improve the security, privacy, and confidentiality of data, systems, networks, individuals, and organizations that use ecommerce Web applications.

What will be an ideal response?

Computer Science & Information Technology

An error such as attempting to divide by zero during runtime will always throw an exception.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A new class of objects can be created quickly and conveniently by ________—the new class absorbs the characteristics of an existing one, possibly customizing them and adding unique characteristics of its own.

a. customization. b. inheritance. c. copying. d. None of the above.

Computer Science & Information Technology