Which of the following programs would a sound information
security policy MOST likely include to handle suspected
intrusions?
A. Response
B. Correction
C. Detection
D. Monitoring
Answer Posted / guest
Answer: A
A sound IS security policy will most likely outline a
response program to handle suspected intrusions. Correction,
detection and monitoring programs are all aspects of
information security, but will not likely be included in an
IS security policy statement.
Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers