CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 51
The training delivery method with the lowest cost to the organization is
____.
•
Question 18
A(n) ____ is the set of rules and configuration guidelines governing the
implementation and operation of IDPSs within the organization.
•
Question 19
A(n) ____ is any system resource that is placed onto a functional system
but has no normal use for that system. If it attracts attention, it is from
unauthorized access and will trigger a notification or response.
•
Question 20
The use of IDPS sensors and analysis systems can be quite complex.
One very common approach is to use an open source software program
called ____ running on an open source UNIX or Linux system that can
be managed and queried from a desktop computer using a client
interface.
•
Question 21