The system administrator has deployed updated security controls for the network to limit risk of attack. The security manager is concerned that controls continue to function as intended to maintain appropriate security posture. Which of the following risk mitigation strategies is MOST important to the security manager?

A. User permissions
B. Policy enforcement
C. Routine audits
D. Change management


Ans: C. Routine audits

Computer Science & Information Technology

You might also like to view...

myContext.fillRect(250, 70, 120, 40);

The statement above draws a filled rectangle with x=___, y=___, width=___, ad height=___.

Computer Science & Information Technology

Bob is arguing that if you use Electronic Codebook (ECB) mode twice in a row to encrypt a long message, M, using the same key each time, that it will be more secure. Explain why Bob is wrong in the case of using a binary one-time pad encryption scheme

What will be an ideal response?

Computer Science & Information Technology

Most document viewers display a visual representation of a PDF document on the left side of your screen.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following software factors does not pertain to maintainability?

A. changeability B. correctability C. flexibility D. interoperability E. testability

Computer Science & Information Technology