To mitigate the adverse effects of network modifications, which of the following should Matt, the security administrator, implement?
A. Change management
B. Routine auditing
C. Incident management
D. Log auditing
Answer: A. Change management
You might also like to view...
Which of the following is true about using inheritance in software engineering?
a. Common attributes and behaviors should be factored out of closely related classes and placed into a base class from which the original classes can now inherit. b. It is best to create a huge class library to make it easy for a client to find the most appropriate class for his or her needs. c. A class produced through inheritance should be as large as possible to fully encompass all of the functionality it should offer. d. The standard C++ libraries that are shipped with C++ compilers are usually enough to accomplish anything an application might need to do.
Which field prevents multiple recipients from seeing each other's email addresses?
a. Fw: b. Cc: c. Bcc:
You can use ____ types of links on web pages.
A. two B. three C. four D. six
What kind of application teaches a particular skill?
A. design B. spreadsheet C. CAD D. educational