A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.

A. security audit trail B. security audit

C. user-level audit D. system-level audit trail

B. security audit

Computer Science & Information Technology

You might also like to view...

What is the first step in implementing a tree?

a. choose a data structure to represent its nodes b. determine the type of item to be stored in the tree c. determine the height of the tree d. determine how many items will be in the tree

Computer Science & Information Technology

Much of personnel security rests on maintaining ____ that complies with all rules and regulations.

A. behavior B. compliance C. an attitude D. a control set

Computer Science & Information Technology