An IS audit concludes that entry to the computer room is appropriately controlled. The audit result provides assurance that:
A. the theft of hardware is prevented.
B. the confidentiality of data is protected.
C. data leakage is prevented.
D. unauthorized access is prevented.
A. the theft of hardware is prevented.
B. the confidentiality of data is protected.
C. data leakage is prevented.
D. unauthorized access is prevented.