Multiple Choice
Attackers only need to find a single weakness to break in.Consequently,companies must ________.
A) have comprehensive security
B) have insurance
C) do risk analysis
D) only give minimum permissions
Correct Answer:

Verified
Correct Answer:
Verified
Q21: Which of the following specifies what should
Q22: A policy specifies _.<br>A) what should be
Q23: It is hardest to create good security
Q24: Another term for authorization is _.<br>A) permission<br>B)
Q25: _ focus on suspicious packets.<br>A) Firewalls<br>B) IDSs<br>C)
Q27: Firewall operation takes place during the _
Q28: Real-time fail-over with synchronized data centers _.<br>A)
Q29: Which of the following is true?<br>A) Guidelines
Q30: Communication with the media should be restricted
Q31: On sensitive resources,authenticated parties should get _.<br>A)