CS chapter 4
A cold site provides many of the same services and options of a hot site, but at a lower cost.
False
A hard drive feature known as "hot swap" is a RAID implementation (typically referred to as RAID Level 1) in which the computer records all data to twin drives simultaneously, providing a backup if the primary drive fails
False
An attack, breach of policy, or other incident always constitutes a violation of law, requiring notification of law enforcement
False
An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.
Framework
__________ is a strategy for the protection of information assets that uses multiple layers and different types of controls (managerial, operational, and technical) to provide optimal protection.
Defensive in Depth