The ________________ provides a complete set of prototype controls to enable a comprehensive security response.

Fill in the blank(s) with the appropriate word(s).

control catalog

Computer Science & Information Technology

You might also like to view...

What access control scheme labels subjects and objects, and allows subjects to access objects when the labels match?

A. DAC B. MAC C. Rule-based access control (RBAC) D. Role-based access control (RBAC)

Computer Science & Information Technology

Which of the following will prevent unauthorized access to the server room?

A. Biometric lock B. PKI card C. Cable lock D. RSA token

Computer Science & Information Technology