As your company's security analyst, you have recently deployed several new security controls as a result of research that you completed. After deploying the controls, you ensure that the controls meet the business needs for which they were deployed. What is the last step of this process?
A. Perform a cost-benefit analysis.
B. Conduct a lessons learned report.
C. Create benchmarks, and compare to baselines.
D. Test multiple solutions.
B
Explanation: The last step of any process is to conduct a lessons learned report.
All of the other steps should have already been completed prior to or during the deployment of the new security controls.
You might also like to view...
________ quality models rely on the analysis of media gathered at system entrance and exit.
A) Black-box media-based B) White-box media-based C) Glass-box parameter-based D) Gray-box parameter-based
The commands in the following session perform the required tasks. Note that the ifconfig command is in the /sbin directory and since this directory isn’t in our shell’s search path, the shell could not locate it. By running the command with its full pathname (/sbin/ifconfig), we were able to execute the command successfully. The Maximum Transmission Unit (MTU) for the Ethernet interface (eth0) is 1500 bytes and that of loopback interface (lo) is 16436 bytes.
What will be an ideal response?
Discuss how software packages for Linux and UNIX were distributed in the past including the shortcomings of this delivery method and how these shortcomings were resolved.
What will be an ideal response?
Modern computers most often use one of two codes to represent characters in a computer - either the American Standard Code for Information Interchange (ASCII) or a newer code called Unicode.
Answer the following statement true (T) or false (F)