Company A and B are merging, with the security administrator for Company A becoming head of IT. In which of the following scenarios would the first step be to perform a vulnerability assessment of the Company B's network?
A. The two networks must be joined.
B. An application used by Company B must be integrated by Company A.
C. The two networks have overlapping IP address ranges.
D. An attack is under way in Company A's network.
A
Explanation: The first step should be to assess any vulnerabilities that exist in company B's network, so when they are joined, the issue will not be transferred to Company A's network.
You might also like to view...
The values stored in an array are called the array's ____.
A. indices B. items C. nodes D. types
When you add a new field to the form, unless it is placed after all the other controls, you will have to adjust the ________
A) width B) default value C) record source D) tab order
You can use a(n) ________ effect to introduce a slide element
Fill in the blank(s) with correct word
Which Cisco IOS command is used to configure a device to use an SNMP manager (NMS) located at the 192.168.100.100 IP address, using version 2c, Informs (versus Traps), and using a community of ThIsCoMmuNiTy?
A) snmp-server manager 192.168.100.100 informs 2c ThIsCoMmunIty B) snmp-server host 192.168.100.100 informs version 2c ThIsCoMmunIty C) snmp-server host 192.168.100.100 version 2c ThIsCoMmunIty D) snmp-server manager 192.168.100.100 2c ThIsCoMmunIty