The approach of using multiple layers of security to protect against a single point is called ___.
DEFENSE IN DEPTH
A person with enthusiasm for a cause or project and often gains acceptance for a project from a wide audience is called ___.
EVANGELIST
The practice and science of classification and hierarchical ___ is a tree structure of classifications for a given set of objects or documents is called ___.
TAXONOMY
TRUE
FALSE
TRUE
Logical access control mechanisms
Initiation, evaluation, development, approval, publication, implementation, and maintenance
Technical
Legal
HR
Audit
Protect systems from attacks on the confidentiality, integrity, and availability of the system
Corrective
Devices and processes used to control physical access Fences Security guards Locked doors Motion detectors Alarms
Procedures
Policy
Defense in depth
TRUE
FALSE
Assess policies and standards and makes recommendations for change
Review requested changes too the policy framework