A+ GRADED. Buy Quality Materials!
A(n) honeynet is usually a computing device or a specially configured computer
that allows or prevents access to a defined area based on a set of rules.
False
A standard is a plan or course of action that conveys instructions from an
organization's senior management to those who make decisions, take actions,
and perform other duties.
False
Systems-specific security policies are formalized as written documents readily
identifiable as policy.
False
A(n) contingency plan is prepared by the organization to anticipate, react to, and
recover from events that threaten the security of information and information
assets in the organization, and, subsequently, to restore the organization to
normal modes of business operations.
True
Standards may be published, scrutinized, and ratified by a group, as in formal or
____ standards.
de jure
Host-based IDPSs are usually installed on the machines they protect to monitor
the status of various files stored on those machines.
True
An alert ____ is a document containing contact information for the people to be
notified in the event of an incident.
roster
A(n) capability table specifies which subjects and objects users or groups can
access.
False
A policy should state that if employees violate a company policy or any law using
company technologies, the company will protect them, and the company is liable
for the employee's actions.
False
A(n) IR plan ensures that critical business functions continue if a catastrophic
incident or disaster occurs.
False
A disaster recovery plan addresses the preparation for and recovery from a
disaster, whether natural or man-made.
True
A ____ site provides only rudimentary services and facilities.
cold