A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.

A. security audit trail B. security audit

C. user-level audit D. system-level audit trail


B. security audit

Computer Science & Information Technology

You might also like to view...

The Unix kernel

A. is an I/O multiplexor B. prevents programmers from erasing files

Computer Science & Information Technology

The Group Header contains the information at the end of every group of records and is shown if you choose summary options in the Report Wizard

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the difference between MouseEvent.CLICK and

MouseEvent.MOUSE_DOWN? What will be an ideal response?

Computer Science & Information Technology

When creating an IPv6 unique local unicast address range, what size is the unique global ID that must be specified?

A) 40 bits B) 64 bits C) 32 bits D) 16 bits

Computer Science & Information Technology