The control measures that are intended to reveal the violations of security policy using software and hardware are associated with:
A. Preventive/physical
B. Detective/technical
C. Detective/physical
D. Detective/administrative
A. Preventive/physical
B. Detective/technical
C. Detective/physical
D. Detective/administrative