Which of the following programs would a sound information security policy MOST likely include to
handle suspected intrusions?

A.
Response
B.
Correction
C.
Detection
D.
Monitoring
Explanation:
A sound IS security policy will most likely outline a response program to handle suspected intrusions.
Correction, detection and monitoring programs are all aspects of information security, but will not
likely be included in an IS security policy statement.