Chapter 55: Detection of Conflicts in Security Policies

Review Questions/Exercises

True/False

1. True
2. True
3. False
4. False
5. True

Multiple Choice

1. D
2. A
3. D
4. C
5. A

Exercise

Solution

The following is a partial exercise solution. The students should be able to expand on the following:
Technical feasibility refers only to engineering possibility and is expected to be a “can/cannot” determination in every circumstance. It is also intended to be determined in light of the equipment and facilities already owned by a responsible entity. The responsible entity is not required to replace any equipment in order to achieve compliance with the cyber security standards. When existing equipment is replaced, however, the responsible entity is expected to use reasonable ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.