_________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.
Fill in the blank(s) with the appropriate word(s).
Preventative
Computer Science & Information Technology
You might also like to view...
Reports and subreports are commonly used to show related records from tables in a(n) ________ relationship
Fill in the blank(s) with correct word
Computer Science & Information Technology
Date constructor with initialization
What will be an ideal response?
Computer Science & Information Technology