The ____ function is essentially on the front-lines of personnel security when it is auditing the performance of the controls in the personnel security operation.
A. auditing
B. certification
C. accountability
D. compliance
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following ensures that the DNS server is authenticated before the transfer of DNS information begins between the DNS server and client?
A. TSIG B. DNSSEC C. SOA D. MX
Computer Science & Information Technology
Completing an instruction involves two phases-instruction and execution-which are each broken down into two steps for a total of four steps. Which of the following is NOT one of the four steps?
A. fetch instruction B. store results C. execute instruction D. process data
Computer Science & Information Technology