The system administrator has deployed updated security controls for the network to limit risk of attack. The security manager is concerned that controls continue to function as intended to maintain appropriate security posture. Which of the following risk mitigation strategies is MOST important to the security manager?
A. User permissions
B. Policy enforcement
C. Routine audits
D. Change management
Ans: C. Routine audits
You might also like to view...
myContext.fillRect(250, 70, 120, 40);
The statement above draws a filled rectangle with x=___, y=___, width=___, ad height=___.
Bob is arguing that if you use Electronic Codebook (ECB) mode twice in a row to encrypt a long message, M, using the same key each time, that it will be more secure. Explain why Bob is wrong in the case of using a binary one-time pad encryption scheme
What will be an ideal response?
Most document viewers display a visual representation of a PDF document on the left side of your screen.
Answer the following statement true (T) or false (F)
Which of the following software factors does not pertain to maintainability?
A. changeability B. correctability C. flexibility D. interoperability E. testability