you are employed as a network administrator of vincent motors. an unreleased blueprint of a new car model of vincent motors has been leaked on the internet. you assume that an intruder must have succeeded in gaining access to your network in order to copy the blueprint. which of the following access control techniques will you use so that such an activity can be detected in the future?
Select one: O Accounting O SOD O Geofencing O Authentication

Respuesta :

JunRR

The control process techniques that can be used so that such an activity can be detected in the future is authentication.

What is administrator of vincent motors?

  • One of the significant management tasks is controlling. In reality, the management function as a whole will be rendered obsolete in the absence of a control process.
  • The next step is controlling. Controlling is a process of controlling the difference between planned output and actual output.
  • The administration won't be able to tell whether the plan is being implemented correctly or not, or whether it is operating well. The primary goal of the management process is to ensure that the planned actions within an organization are occurring.
  • The control process aids managers in assessing the performance level of their individual organizations. The final function of management is control. If other management tasks are properly performed, the controlling function would become obsolete.
  • Control will be necessary when there are any issues with the planned or collection and reporting.

To learn more about control process here:

https://brainly.com/question/15060582

#SPJ4