A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.
A. security audit trail B. security audit
C. user-level audit D. system-level audit trail
B. security audit
Computer Science & Information Technology
You might also like to view...
What is the first step in implementing a tree?
a. choose a data structure to represent its nodes b. determine the type of item to be stored in the tree c. determine the height of the tree d. determine how many items will be in the tree
Computer Science & Information Technology
Much of personnel security rests on maintaining ____ that complies with all rules and regulations.
A. behavior B. compliance C. an attitude D. a control set
Computer Science & Information Technology