A security audit tests to ensure that the proper ____ and procedures are in place to handle a potential vulnerability.

A. people
B. resources
C. policies
D. logs

Answer: C

Computer Science & Information Technology

You might also like to view...

You can only use one shape fill, outline color, or line weight; you cannot use them in combination

Indicate whether the statement is true or false

Computer Science & Information Technology

Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology