Page 769 - StudyBook.pdf
P. 769

Operational and Organizational Security: Policies and Disaster Recovery• Chapter 12  753

                       High availability is provided through redundant systems and fault
                         tolerance.

                       There are different levels of RAID that can be implemented, each with
                         unique characteristics that provide increased performance and/or fault
                         tolerance

                 Exam Objectives

                 Frequently Asked Questions



                 The following Frequently Asked Questions, answered by the authors of this
                 book, are designed to both measure your understanding of the Exam Objectives
                 presented in this chapter, and to assist you with real-life implementation of
                 these concepts.

                 Q: I’m concerned about racism and sexism within the company, and want new
                    employees to be aware of the standards our company expects from them. I’m
                    concerned that if we implement a policy, those who violate it may claim they
                    did not know about its existence.What can we do?
                 A: Policies can be used as a contract or understanding between employees and the
                    company. By implementing a code of ethics, you can have employees sign it to
                    show they have read and understand the policy.This can also be done with an
                    acceptable use policy, which can address ethical issues as they relate to company
                    e-mail and other services.


                 Q: I’m concerned that a user may be using e-mail for non-work related use, and
                    may be sending confidential information over the Internet.What policy would
                    allow me to audit the content of his e-mail?
                 A: A privacy policy can stipulate that corporate e-mail accounts are the property
                    of the company, and any e-mail sent or received with these accounts can be
                    audited at any time.

                 Q: I want to implement access control for a system that needs to be extremely
                    secure, and includes mission critical applications.What should I use, MAC,
                    DAC, or RBAC?






                                                                              www.syngress.com
   764   765   766   767   768   769   770   771   772   773   774