The aim of a(n) ____ is to obtain all of the evidence that is needed to understand intruder activity and then provide information for proceeding with remedial action.
A. audit
B. evaluation
C. assessment
D. review
Answer: A
Computer Science & Information Technology
You might also like to view...
The Find & Replace button is in the Editing group on the ________ tab
A) Home B) Page Layout C) Insert D) Data
Computer Science & Information Technology
________ such as ROTFL are inappropriate in business writing
Fill in the blank(s) with correct word
Computer Science & Information Technology