The ____ function is essentially on the front-lines of personnel security when it is auditing the performance of the controls in the personnel security operation.

A. auditing
B. certification
C. accountability
D. compliance

Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following ensures that the DNS server is authenticated before the transfer of DNS information begins between the DNS server and client?

A. TSIG B. DNSSEC C. SOA D. MX

Computer Science & Information Technology

Completing an instruction involves two phases-instruction and execution-which are each broken down into two steps for a total of four steps. Which of the following is NOT one of the four steps?

A. fetch instruction B. store results C. execute instruction D. process data

Computer Science & Information Technology