In which situation would a detective control be warranted?
- when the organization needs to look for prohibited activity
- after the organization has experienced a breach in order to restore everything back to a normal state
- when the organization cannot use a guard dog, so it is necessary to consider an alternative
- when the organization needs to repair damage
Explanation: Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.
Exam with this question: Cybersecurity Essentials FINAL Quiz Answers Full Questions
Exam with this question: Checkpoint Exam: Vulnerability Assessment and Risk Management
Exam with this question: Cyber Threat Management: My Knowledge Check Answers
Please login or Register to submit your answer