CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 51

The training delivery method with the lowest cost to the organization is ____. • Question 18 A(n) ____ is the set of rules and configuration guidelines governing the implementation and operation of IDPSs within the organization. • Question 19 A(n) ____ is any system resource that is placed onto a functional system but has no normal use for that system. If it attracts attention, it is from unauthorized access and will trigger a notification or response. • Question 20 The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software program called ____ running on an open source UNIX or Linux system that can be managed and queried from a desktop computer using a client interface. • Question 21