CO 1) Which of the following should not be the basis for security policy?
Legislation |
domains, classes, families |
Confidentiality, integrity, and availability |
people, separation of duties, technology |
law |
solutions, implement, abstractions |
closed-circuit television |
continuous monitoring |
Hot site |
objects, subjects |
messages, identities |
Internal certificate authority |
software |
type a, type b |
Improved performance |

Leave a Reply
Want to join the discussion?Feel free to contribute!