Author Question: Defining security policies and then centrally managing and enforcing those policies via security ... (Read 69 times)

tth

  • Hero Member
  • *****
  • Posts: 579
Defining security policies and then centrally managing and enforcing those policies via security management products and services is known as:
 
  A)
 
  intrusion-based management.
  B)
 
  policy-based management.
  C)
 
  incident-based management.
  D)
 
  None of the above

Question 2

Which of the following is NOT a design class?
 
  A) standard
  B) control
  C) boundary
  D) utility



Zebsrer

  • Sr. Member
  • ****
  • Posts: 284
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Allergies play a major part in the health of children. The most prevalent childhood allergies are milk, egg, soy, wheat, peanuts, tree nuts, and seafood.

Did you know?

In 1844, Charles Goodyear obtained the first patent for a rubber condom.

Did you know?

Pubic lice (crabs) are usually spread through sexual contact. You cannot catch them by using a public toilet.

Did you know?

GI conditions that will keep you out of the U.S. armed services include ulcers, varices, fistulas, esophagitis, gastritis, congenital abnormalities, inflammatory bowel disease, enteritis, colitis, proctitis, duodenal diverticula, malabsorption syndromes, hepatitis, cirrhosis, cysts, abscesses, pancreatitis, polyps, certain hemorrhoids, splenomegaly, hernias, recent abdominal surgery, GI bypass or stomach stapling, and artificial GI openings.

Did you know?

Long-term mental and physical effects from substance abuse include: paranoia, psychosis, immune deficiencies, and organ damage.

For a complete list of videos, visit our video library