List of questions
Related questions
Question 12 - Cybersecurity Audit discussion
Availability can be protected through the use of:
A.
user awareness training and related end-user training.
B.
access controls. We permissions, and encryption.
C.
logging, digital signatures, and write protection.
D.
redundancy, backups, and business continuity management
Your answer:
0 comments
Sorted by
Leave a comment first