Which of the following programs would a sound informati…

Which of the following programs would a sound information security policy MOST likely include to handle
suspected intrusions?

Which of the following programs would a sound information security policy MOST likely include to handle
suspected intrusions?

A.
Response

B.
Correction

C.
Detection

D.
Monitoring

Explanation:
A sound IS security policy will most likely outline a response program to handle suspected intrusions.
Correction, detection and monitoring programs are all aspects of information security, but will not likely be
included in an IS security policy statement.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

six + 12 =