Company A and B are merging, with the security administrator for Company A becoming head of IT. In which of the following scenarios would the first step be to perform a vulnerability assessment of the Company B's network?

A. The two networks must be joined.
B. An application used by Company B must be integrated by Company A.
C. The two networks have overlapping IP address ranges.
D. An attack is under way in Company A's network.


A
Explanation: The first step should be to assess any vulnerabilities that exist in company B's network, so when they are joined, the issue will not be transferred to Company A's network.

Computer Science & Information Technology

You might also like to view...

The values stored in an array are called the array's ____.

A. indices B. items C. nodes D. types

Computer Science & Information Technology

When you add a new field to the form, unless it is placed after all the other controls, you will have to adjust the ________

A) width B) default value C) record source D) tab order

Computer Science & Information Technology

You can use a(n) ________ effect to introduce a slide element

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which Cisco IOS command is used to configure a device to use an SNMP manager (NMS) located at the 192.168.100.100 IP address, using version 2c, Informs (versus Traps), and using a community of ThIsCoMmuNiTy?

A) snmp-server manager 192.168.100.100 informs 2c ThIsCoMmunIty B) snmp-server host 192.168.100.100 informs version 2c ThIsCoMmunIty C) snmp-server host 192.168.100.100 version 2c ThIsCoMmunIty D) snmp-server manager 192.168.100.100 2c ThIsCoMmunIty

Computer Science & Information Technology