Author Question: Defining security policies and then centrally managing and enforcing those policies via security ... (Read 138 times)

tth

  • Hero Member
  • *****
  • Posts: 579
Defining security policies and then centrally managing and enforcing those policies via security management products and services is known as:
 
  A)
 
  intrusion-based management.
  B)
 
  policy-based management.
  C)
 
  incident-based management.
  D)
 
  None of the above

Question 2

Which of the following is NOT a design class?
 
  A) standard
  B) control
  C) boundary
  D) utility



Zebsrer

  • Sr. Member
  • ****
  • Posts: 284
Answer to Question 1

B

Answer to Question 2

A



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

There are more nerve cells in one human brain than there are stars in the Milky Way.

Did you know?

For about 100 years, scientists thought that peptic ulcers were caused by stress, spicy food, and alcohol. Later, researchers added stomach acid to the list of causes and began treating ulcers with antacids. Now it is known that peptic ulcers are predominantly caused by Helicobacter pylori, a spiral-shaped bacterium that normally exist in the stomach.

Did you know?

An identified risk factor for osteoporosis is the intake of excessive amounts of vitamin A. Dietary intake of approximately double the recommended daily amount of vitamin A, by women, has been shown to reduce bone mineral density and increase the chances for hip fractures compared with women who consumed the recommended daily amount (or less) of vitamin A.

Did you know?

Cancer has been around as long as humankind, but only in the second half of the twentieth century did the number of cancer cases explode.

Did you know?

Human stomach acid is strong enough to dissolve small pieces of metal such as razor blades or staples.

For a complete list of videos, visit our video library