_________ controls focus on preventing security beaches from occurring by inhibiting attempts to violate security policies or exploit a vulnerability.
What will be an ideal response?
Question 2
Storyboards cannot be used to elicit responses and gather requirements.
Indicate whether the statement is true or false