The aim of a(n) ____ is to obtain all of the evidence that is needed to understand intruder activity and then provide information for proceeding with remedial action.

A. audit
B. evaluation
C. assessment
D. review

Answer: A

Computer Science & Information Technology

You might also like to view...

The Find & Replace button is in the Editing group on the ________ tab

A) Home B) Page Layout C) Insert D) Data

Computer Science & Information Technology

________ such as ROTFL are inappropriate in business writing

Fill in the blank(s) with correct word

Computer Science & Information Technology