____ audit processes use event logs, critical system files, and other evidence-based means to identify exploits that an automated system cannot recognize.

A. System-based
B. Human-based
C. Hybrid
D. Control-based

Answer: B

Computer Science & Information Technology

You might also like to view...

For each of the following sets of integers, write a single statement that will print a number at random from the set.

a) 2, 4, 6, 8, 10. b) 3, 5, 7, 9, 11. c) 6, 10, 14, 18, 22.

Computer Science & Information Technology

What Linux distribution is considered a cutting-edge distribution?

A. Debian B. Fedora C. Red Hat Enterprise Linux D. Ubuntu

Computer Science & Information Technology