Which of the following can be performed when an element of the company policy cannot be enforced by technical means?
Which of the following assessment techniques would a security administrator implement to ensure that systems and software are developed properly?
Which of the following would a security administrator implement in order to identify a problem between two applications that are not communicating properly?
Which of the following would a security administrator implement in order to identify change from the standard configuration on a server?