In which of the following situations would a detective control be warranted?
- When an organization needs to repair damage
- When an organization cannot use a guard dog and must therefore consider alternative control options
- To restore an organization’s system to a normal state after experiencing a breach
- When an organization needs to identify prohibited activity
Explanation: Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.
Exam with this question: Cybersecurity Essentials: Course Final Exam Answers
Please login or Register to submit your answer