The ________________ provides a complete set of prototype controls to enable a comprehensive security response.
Fill in the blank(s) with the appropriate word(s).
control catalog
Computer Science & Information Technology
You might also like to view...
What access control scheme labels subjects and objects, and allows subjects to access objects when the labels match?
A. DAC B. MAC C. Rule-based access control (RBAC) D. Role-based access control (RBAC)
Computer Science & Information Technology
Which of the following will prevent unauthorized access to the server room?
A. Biometric lock B. PKI card C. Cable lock D. RSA token
Computer Science & Information Technology