____ audit processes use event logs, critical system files, and other evidence-based means to identify exploits that an automated system cannot recognize.
A. System-based
B. Human-based
C. Hybrid
D. Control-based
Answer: B
Computer Science & Information Technology
You might also like to view...
For each of the following sets of integers, write a single statement that will print a number at random from the set.
a) 2, 4, 6, 8, 10. b) 3, 5, 7, 9, 11. c) 6, 10, 14, 18, 22.
Computer Science & Information Technology
What Linux distribution is considered a cutting-edge distribution?
A. Debian B. Fedora C. Red Hat Enterprise Linux D. Ubuntu
Computer Science & Information Technology