Author Question: Defining security policies and then centrally managing and enforcing those policies via security ... (Read 143 times)

tth

  • Hero Member
  • *****
  • Posts: 579
Defining security policies and then centrally managing and enforcing those policies via security management products and services is known as:
 
  A)
 
  intrusion-based management.
  B)
 
  policy-based management.
  C)
 
  incident-based management.
  D)
 
  None of the above

Question 2

Which of the following is NOT a design class?
 
  A) standard
  B) control
  C) boundary
  D) utility



Zebsrer

  • Sr. Member
  • ****
  • Posts: 284
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

If you could remove all of your skin, it would weigh up to 5 pounds.

Did you know?

Approximately one in three babies in the United States is now delivered by cesarean section. The number of cesarean sections in the United States has risen 46% since 1996.

Did you know?

The average person is easily confused by the terms pharmaceutics and pharmacology, thinking they are one and the same. Whereas pharmaceutics is the science of preparing and dispensing drugs (otherwise known as the science of pharmacy), pharmacology is the study of medications.

Did you know?

Multiple sclerosis is a condition wherein the body's nervous system is weakened by an autoimmune reaction that attacks the myelin sheaths of neurons.

Did you know?

More than one-third of adult Americans are obese. Diseases that kill the largest number of people annually, such as heart disease, cancer, diabetes, stroke, and hypertension, can be attributed to diet.

For a complete list of videos, visit our video library