A security audit tests to ensure that the proper ____ and procedures are in place to handle a potential vulnerability.
A. people
B. resources
C. policies
D. logs
Answer: C
Computer Science & Information Technology
You might also like to view...
You can only use one shape fill, outline color, or line weight; you cannot use them in combination
Indicate whether the statement is true or false
Computer Science & Information Technology
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology