Which of the following programs would a sound information
security policy MOST likely include to handle suspected
intrusions?
A. Response
B. Correction
C. Detection
D. Monitoring
Answer Posted / guest
Answer: A
A sound IS security policy will most likely outline a
response program to handle suspected intrusions. Correction,
detection and monitoring programs are all aspects of
information security, but will not likely be included in an
IS security policy statement.
| Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers