The IT security professional is responsible for ____ controls.

A. electronic
B. permanent
C. non-electronic
D. temporary

Answer: C

Computer Science & Information Technology

You might also like to view...

________ is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is a user-defined field that derives its value by performing calculations on other fields in a PivotTable

A. value function B. dataset variable C. user field D. calculated field

Computer Science & Information Technology