Which of the following is a key component of an organization's information security policy?


What is the role of an Intrusion Detection System (IDS)?


Which of the following best describes a firewall's function?


What is the primary purpose of data encryption?


Which of the following best describes 'business impact analysis' (BIA)?


What is the primary objective of 'data archiving'?


Which of the following is essential for maintaining 'system uptime'?


What is the role of 'business continuity testing'?


Which of the following best describes the concept of 'continuous monitoring' in IT operations?


What is the purpose of a 'network disaster recovery plan'?