Which of the following best describes an assessment?
A. Evidenced-based examination that compares current practices against a specific internal or external criteria
B. A focused privileged inspection to determine condition, locate weakness or vulnerabilities, and identity corrective actions
C. Testing controls by performing vulnerability assessment tests that simulate real attacks
D. Configuring the System and Security logs on each system to record and audit activities
Answer: B
Explanation: A focused privileged inspection to determine condition, locate weakness or vulnerabilities, and identity corrective actions is an assessment. An audit is an evidenced-based examination that compares current practices against a specific internal or external criteria and testing controls by performing vulnerability assessment tests that simulate real attacks is an assurance.
You might also like to view...
Write a one-line function (Sobell, page 356) named welcome that displays Welcome to my computer. Demonstrate that the function works.
What will be an ideal response?
The advantage of using pointers rather than references is that the function call specifies that addresses are being used.
Answer the following statement true (T) or false (F)
In the accompanying figure, Item 1 points to the ____.
A. footer B. header C. citation D. footnote
As part of the URL, the ____ is the way that computers ask for and communicate about the requested document.
A. style B. setting C. theme D. scheme