81) Insuring all the systems and information processing processes is an essential part of risk acceptance strategy. 82) A virtual private network is a network connection that is constructed dynamically within an existing network. 83) A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network. 84) A hot backup site is an empty warehouse with all necessary connections for power and communication. 85) Redundant data centers can be used to secure the facilities infrastructure of organizations. 86) A honeypot is a computer, data, or network site that is used to penetrate other networks and computer systems to snoop or to cause damage. 87) An account management policy explains technical controls on all organizational computer systems, such as access limitations, audit-control software, firewalls, and so on. 88) Recovery point objectives are used to specify how current the backup data should be. 89) Detective controls are used to prevent any potentially negative event from occurring, such as by preventing outside intruders from accessing a facility. 90) COBIT is a set of best practices that helps organizations maximize the benefits from their IS infrastructure and establish appropriate controls.