Which of the following controls is MOST effective for protecting software and access to sensitive data?
A. Security policies
B. Biometric physical access control for the server room
C. Fault tolerance with complete systems and data redundancy
D. Logical access controls for the operating systems, applications, and data
Answer: D. Logical access controls for the operating systems, applications, and data
Business