List of questions
Related questions
Question 79 - CISSP discussion
Logical access control programs are MOST effective when they are
A.
approved by external auditors.
B.
combined with security token technology.
C.
maintained by computer security officers.
D.
made part of the operating system.
Your answer:
0 comments
Sorted by
Leave a comment first