Multiple Choice
This logs and monitors who is on or trying to access an organization's network.
A) biometrics
B) electronic vaulting
C) intrusion detection systems (IDS)
D) Firewall
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q39: _ identification systems identify authorized personnel through
Q65: The first list below contains 10 control
Q66: Program change controls provide assurance that all
Q72: The four events-processing functions that constitute the
Q73: _ is any fraud committed by two
Q75: Training materials help users learn their jobs
Q75: The data entry clerk types data from
Q85: Combining the functions of authorizing and executing
Q88: A key control concern is that certain
Q97: Application documentation that describes the application and