Text, buttons, pictures, or other objects that, when clicked, access other sections of the active document or another file
a. Internal links
b. Hyperlinks
c. Text links
B
You might also like to view...
If the Single Step feature is on when a macro ends, it will automatically turn off
Indicate whether the statement is true or false
Answer the following statements true (T) or false (F)
1. The security administrator must define the set of events that are subject to audit. 2. Event and audit trail analysis software, tools, and interfaces may be used to analyze collected data as well as for investigating data trends and anomalies. 3. According to ISO 27002, the person(s) carrying out the audit should be independent of the activities audited. 4. Data representing behavior that does not trigger an alarm cannot serve as input to intrusion detection analysis. 5. The first order of business in security audit trail design is the selection of data items to capture.