Due to the potential impact of changes that can affect all users in an organization, and considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?

A. change management team
B. incident response team
C. security control team
D. compliance team


Answer: A

Computer Science & Information Technology

You might also like to view...

Using the font shorthand property, values must be specified for the ____ property.

A. font-style B. font-weight C. font-size D. all of the above

Computer Science & Information Technology

Active fingerprinting is more powerful but has a higher potential of being discovered

Indicate whether the statement is true or false.

Computer Science & Information Technology

A switch resides at Layer _______ of the OSI model

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following strategies will prevent a company from having to notify residents of a data breach involving personal information?

A. Encrypt all personal information, including sensitive personal information B. Ensure that all personal information is protected by adequate safeguards C. Use a firewall to protect all personal information D. Purge all personal information after one year

Computer Science & Information Technology