In which of the following situations would a detective control be warranted?
- When an organization needs to repair damage
- When an organization cannot use a guard dog and must therefore consider alternative control options
- To restore an organization’s system to a normal state after experiencing a breach
- When an organization needs to identify prohibited activity
Explanation: Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.
More Questions: Cybersecurity Essentials: Course Final Exam Answers