Author Question: Defining security policies and then centrally managing and enforcing those policies via security ... (Read 148 times)

tth

  • Hero Member
  • *****
  • Posts: 579
Defining security policies and then centrally managing and enforcing those policies via security management products and services is known as:
 
  A)
 
  intrusion-based management.
  B)
 
  policy-based management.
  C)
 
  incident-based management.
  D)
 
  None of the above

Question 2

Which of the following is NOT a design class?
 
  A) standard
  B) control
  C) boundary
  D) utility



Zebsrer

  • Sr. Member
  • ****
  • Posts: 284
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The average human gut is home to perhaps 500 to 1,000 different species of bacteria.

Did you know?

The familiar sounds of your heart are made by the heart's valves as they open and close.

Did you know?

Your skin wrinkles if you stay in the bathtub a long time because the outermost layer of skin (which consists of dead keratin) swells when it absorbs water. It is tightly attached to the skin below it, so it compensates for the increased area by wrinkling. This happens to the hands and feet because they have the thickest layer of dead keratin cells.

Did you know?

Once thought to have neurofibromatosis, Joseph Merrick (also known as "the elephant man") is now, in retrospect, thought by clinical experts to have had Proteus syndrome. This endocrine disease causes continued and abnormal growth of the bones, muscles, skin, and so on and can become completely debilitating with severe deformities occurring anywhere on the body.

Did you know?

A seasonal flu vaccine is the best way to reduce the chances you will get seasonal influenza and spread it to others.

For a complete list of videos, visit our video library