_________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.

Fill in the blank(s) with the appropriate word(s).

Preventative

Computer Science & Information Technology

You might also like to view...

Reports and subreports are commonly used to show related records from tables in a(n) ________ relationship

Fill in the blank(s) with correct word

Computer Science & Information Technology

Date constructor with initialization

What will be an ideal response?

Computer Science & Information Technology