Buscar
Estás en modo de exploración. debe iniciar sesión para usar MEMORY

   Inicia sesión para empezar


Por supuesto:

ICE CONSULTING PRODUCTS & SERVICES

» Iniciar este curso
(Practica preguntas similares gratis)
Pregunta:

Security

Autor: James Williams



Respuesta:

System resources must be defended against outside access to comply with the principle of security. Access controls must adequately resist attempts at intrusion, device manipulation, unauthorized deletion, data misuse, or improper modification and release. An auditor looks at IT security tools like WAF (web application firewalls), encryption and intrusion detection in addition to administrative controls such as background checks and authorizations.


0 / 5  (0 calificaciones)

1 answer(s) in total