D. Interoffice memo
E. Customer correspondence
D. Only appropriate information-technology personnel
C. Social engineering
D. Background checks
E. Employee handbooks
A. Partial-knowledge test
B. Statistical anomaly
A. Accidental or intentional data deletion
B. Severe weather disasters
E. Minor power outages
D. Place them in a centralized Lightweight Directory Access Protocol.
E. Business continuity plan
B. Reviewing performance logs
A. Distributed denial-of-service
B. Full interruption
A. Security-awareness training
C. Personal firewall
E. Anti-virus software
A. Lightweight Directory Access Protocol
B. Reference monitor
A. False Rejection Rate
C. Crossover Error Rate
D. False Acceptance Rate
D. Security policy mission statement