An administrator would like to review the effectiveness of existing security in the enterprise. Which of the following would be the BEST place to start?

A. Review past security incidents and their resolution
B. Rewrite the existing security policy
C. Implement an intrusion prevention system
D. Install honey pot systems


Answer: C. Implement an intrusion prevention system

Computer Science & Information Technology

You might also like to view...

LIFO means:

A. the last element that comes out is the first one to go in B. the last element to go in is the first element to come in C. the last element to go in is the first element to come out D. the last element that comes in is the first one to go in

Computer Science & Information Technology

Describe the purpose of using inference rules to identify functional dependencies for a given relation.

What will be an ideal response?

Computer Science & Information Technology

Describe the complexity (order) of insertion into a B-tree.

What will be an ideal response?

Computer Science & Information Technology

The first netfilter hook packets encounter is ________.

a) NF_IP_LOCAL_IN b) NF_IP_LOCAL_OUT c) NF_IP_PRE_ROUTING d) NF_IP_FORWARD

Computer Science & Information Technology