Multiple Choice
If there is a security breach on your organizational information systems,which information security area is best suited to handle the breach?
A) Authentication and authorization
B) Prevention and resistance
C) Detection and response
D) Detection and resistance
Correct Answer:

Verified
Correct Answer:
Verified
Q15: The Trojan-horse virus hides inside other software,
Q39: Insiders are illegitimate users who purposely or
Q44: Summarize the five steps to creating an
Q48: Which term describes legitimate users who purposely
Q50: Which of the following does a firewall
Q51: Spoofing is the forging of the _
Q52: What is the recommended way to implement
Q53: _ is a hacker with criminal intent.
Q54: _ are people very knowledgeable about computers
Q83: Describe the relationship between information security policies