At its core, the purpose of the personnel security function is to ____.
A. audit the actions of untrusted individuals
B. review the actions of trusted individuals
C. log the actions of untrusted individuals
D. monitor the actions of trusted individuals
Answer: D
Computer Science & Information Technology
You might also like to view...
The ________ Act made it illegal to remove DRM from protected files
Fill in the blank(s) with correct word
Computer Science & Information Technology
In the Word Options dialog box, Popular Commands can be found from the ________ box
A) Customize the ribbon B) New Group C) Add D) Choose commands from
Computer Science & Information Technology