C. A preaction system is the best type of water-based fire suppression system for a computer

content-dependent access control A form of access control based on the contents or pay- load of an object. context-dependent access control A form of access control based on the context or sur- roundings of an object. continuity A goal an organization can accomplish by having plans and procedures to help mitigate the effects a disaster has on its continuing operations and to speed the return to normal operations. contractual license agreement A written contract between the software vendor and the cus- tomer outlining the responsibilities of each. control The use of access rules to limit a subject’s access to an object. controls gap The difference between total risk and residual risk. Copper Distributed Data Interface CDDI Deployment of FDDI using twisted pair i.e., copper wires. Reduces the maximum segment length to 100 meters and is susceptible to interference. copyright Law that guarantees the creators of “original works of authorship” protection against the unauthorized duplication of their work. corrective access control An access control deployed to restore systems to normal after an unwanted or unauthorized activity has occurred. Examples of corrective access controls include alarms, mantraps, and security policies. corrective controls Instructions, procedures, or guidelines used to reverse the effects of an unwanted activity, such as attacks or errors. countermeasures Actions taken to patch a vulnerability or secure a system against an attack. Countermeasures can include altering access controls, reconfiguring security settings, installing new security devices or mechanisms, adding or removing services, and so on. coupling The level of interaction between objects. Lower coupling means less interaction. Lower coupling delivers better software design because objects are more independent. Lower coupling is easier to troubleshoot and update. Objects with low cohesion require lots of assis- tance from other objects to perform tasks and have high coupling. covert channel The means by which data can be communicated outside of normal, expected, or detectable methods. covert storage channel A channel that conveys information by writing data to a common storage area where another process can read it. covert timing channel A channel that conveys information by altering the performance of a system component or modifying a resource’s timing in a predictable manner. This is generally a more sophisticated method to covertly pass data and is very difficult to detect.