_______ controls are pervasive, generic, underlying technical IT security capabilities that are interrelated with, and used by, many other controls.

A. Preventative B. Supportive

C. Operational D. Detection and recovery

B. Supportive

Computer Science & Information Technology

You might also like to view...

Write a counter-controlled loop that adds 5, 10, 15, 20, 25, and 30 to thelstMinutescontrol.

What will be an ideal response?

Computer Science & Information Technology

Coding links in a navigation system as an unordered list provides the _________ around each link, which is required to style the links for different viewport sizes later?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology