After accessing your organization and its security needs, you make several recommendations regarding security training for personnel. Management decides to adopt all the security training recommendations. Of which type of control are these recommendations an example?

A. Administrative
B. Technical
C. Physical
D. Recovery

A

Explanation: Security training is an example of an administrative control.

Computer Science & Information Technology

You might also like to view...

Built-in arrays can be manipulated by Standard Library algorithms, using ___________ as iterators.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

On the ____ bar, click Layer, and then click Flatten Image to flatten an image.

a. Layers b. Images c. Standard d. Menu

Computer Science & Information Technology