Answer: Logical security list
Explanation:Logical security list that is used for checking of the authentication and authorization for the organizations. It consist the safeguarding the software, security access of password and other keys, system auditing, stages of the security etc.
These factors helps in the maintaining the level of the security and only authorized access to place in the system of a particular organization.Other options are incorrect because physical security system consist of the guards , locks etc physical devices, response plane is the feedback strategy and whiltelist is related with the acceptable people.
Answer:
The term is Change control system
Explanation:
Change control system is a systematic approach or important part of project management process used to implement and serves vital purposes of assuring that the process of making changes is done carefully and ultimately signed off on by a responsible party. It enables essential control of IT activities in project management and coordination.
Because a lot of people post false information on websites and marketing managers (whatever they're called) will actually falsely advertise their product as using new technology.