Author Question: Defining security policies and then centrally managing and enforcing those policies via security ... (Read 120 times)

tth

  • Hero Member
  • *****
  • Posts: 579
Defining security policies and then centrally managing and enforcing those policies via security management products and services is known as:
 
  A)
 
  intrusion-based management.
  B)
 
  policy-based management.
  C)
 
  incident-based management.
  D)
 
  None of the above

Question 2

Which of the following is NOT a design class?
 
  A) standard
  B) control
  C) boundary
  D) utility



Zebsrer

  • Sr. Member
  • ****
  • Posts: 284
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Your skin wrinkles if you stay in the bathtub a long time because the outermost layer of skin (which consists of dead keratin) swells when it absorbs water. It is tightly attached to the skin below it, so it compensates for the increased area by wrinkling. This happens to the hands and feet because they have the thickest layer of dead keratin cells.

Did you know?

Pubic lice (crabs) are usually spread through sexual contact. You cannot catch them by using a public toilet.

Did you know?

The training of an anesthesiologist typically requires four years of college, 4 years of medical school, 1 year of internship, and 3 years of residency.

Did you know?

Nitroglycerin is used to alleviate various heart-related conditions, and it is also the chief component of dynamite (but mixed in a solid clay base to stabilize it).

Did you know?

No drugs are available to relieve parathyroid disease. Parathyroid disease is caused by a parathyroid tumor, and it needs to be removed by surgery.

For a complete list of videos, visit our video library