Good security management starts with the creation of a coherent set of ____________________.
Fill in the blank(s) with the appropriate word(s).
policies
You might also like to view...
MC Python creates__________ objects when it encounters an exception.
a) exception. b) traceforward. c) traceback. d) error.
“The tragedy of the commons” suggests that any shared resource will be destroyed by
a. theft. b. erosion. c. overuse. d. teenagers.
As part of your organization's comprehensive security plan, all departments must perform full data backups on a weekly basis. Which type of control does this describe?
A. technical control B. administrative control C. physical control D. detective control
Which of the following statements best describes a DMZ?
A. It allows users to establish a secure connection over a public network. B. It filters incoming and outgoing traffics based on a set of rules. C. It is a specially configured network that sits between the public and the internal network. D. It translates the internal private IP addresses to a public IP address.