A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.
A. security audit trail B. security audit
C. user-level audit D. system-level audit trail
B. security audit
Computer Science & Information Technology
You might also like to view...
The Unix kernel
A. is an I/O multiplexor B. prevents programmers from erasing files
Computer Science & Information Technology
The Group Header contains the information at the end of every group of records and is shown if you choose summary options in the Report Wizard
Indicate whether the statement is true or false
Computer Science & Information Technology
What is the difference between MouseEvent.CLICK and
MouseEvent.MOUSE_DOWN? What will be an ideal response?
Computer Science & Information Technology
When creating an IPv6 unique local unicast address range, what size is the unique global ID that must be specified?
A) 40 bits B) 64 bits C) 32 bits D) 16 bits
Computer Science & Information Technology