Thursday, June 7, 2007

Question 78

Which of the following is suitable as a description of “preventive” functions in approaches to secure computing?

a) Checking an access log and monitoring for illegal accesses.
b) Establishing a contingency plan and implementing training.
c) Periodically backing up important files.
d) Implementing in-house security education to increase individual awareness.


No comments: