List of questions
Related questions
Question 52 - Cybersecurity Audit discussion
Which control mechanism is used to detect the unauthorized modification of key configuration settings?
A.
Sandboxing
B.
Whitelisting
C.
URL filtering
D.
File integrity
Your answer:
0 comments
Sorted by
Leave a comment first