At its core, the purpose of the personnel security function is to ____.

A. audit the actions of untrusted individuals
B. review the actions of trusted individuals
C. log the actions of untrusted individuals
D. monitor the actions of trusted individuals

Answer: D

Computer Science & Information Technology

You might also like to view...

The ________ Act made it illegal to remove DRM from protected files

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the Word Options dialog box, Popular Commands can be found from the ________ box

A) Customize the ribbon B) New Group C) Add D) Choose commands from

Computer Science & Information Technology