Which of the following best describes an assessment?

A. Evidenced-based examination that compares current practices against a specific internal or external criteria
B. A focused privileged inspection to determine condition, locate weakness or vulnerabilities, and identity corrective actions
C. Testing controls by performing vulnerability assessment tests that simulate real attacks
D. Configuring the System and Security logs on each system to record and audit activities


Answer: B
Explanation: A focused privileged inspection to determine condition, locate weakness or vulnerabilities, and identity corrective actions is an assessment. An audit is an evidenced-based examination that compares current practices against a specific internal or external criteria and testing controls by performing vulnerability assessment tests that simulate real attacks is an assurance.

Computer Science & Information Technology

You might also like to view...

Write a one-line function (Sobell, page 356) named welcome that displays Welcome to my computer. Demonstrate that the function works.

What will be an ideal response?

Computer Science & Information Technology

The advantage of using pointers rather than references is that the function call specifies that addresses are being used.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the accompanying figure, Item 1 points to the ____.

A. footer B. header C. citation D. footnote

Computer Science & Information Technology

As part of the URL, the ____ is the way that computers ask for and communicate about the requested document.

A. style B. setting C. theme D. scheme

Computer Science & Information Technology