D. Security policy mission statement
A. False Rejection Rate
C. Crossover Error Rate
D. False Acceptance Rate
B. Reference monitor
A. Lightweight Directory Access Protocol
C. Personal firewall
E. Anti-virus software
A. Security-awareness training
C. Address spoofing
A. Distributed denial-of-service
B. Reviewing performance logs
E. Business continuity plan
D. Place them in a centralized Lightweight Directory Access Protocol.
A. Accidental or intentional data deletion
B. Severe weather disasters
E. Minor power outages