After accessing your organization and its security needs, you make several recommendations regarding security training for personnel. Management decides to adopt all the security training recommendations. Of which type of control are these recommendations an example?
A. Administrative
B. Technical
C. Physical
D. Recovery
A
Explanation: Security training is an example of an administrative control.
Computer Science & Information Technology
You might also like to view...
Built-in arrays can be manipulated by Standard Library algorithms, using ___________ as iterators.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
On the ____ bar, click Layer, and then click Flatten Image to flatten an image.
a. Layers b. Images c. Standard d. Menu
Computer Science & Information Technology