How is a posture assessment performed on an organization?

a. A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.
b. A third party organization is tasked with attempting to break into the organization and compromise security in order to determine threat vectors.
c. A report of data that is subject to special regulation is created, such that the organization is aware of what data needs protection.
d. An assessment of how a network will perform under stress is performed to determine if the network throughput is adequate.


ANSWER: a

Computer Science & Information Technology

You might also like to view...

What is a prompt?

What will be an ideal response?

Computer Science & Information Technology

Identify the type of control that performs an action.?

A. ?A selection list                                                                                      B. ?A form button                                                                                       C. ?An input box D. ?A text area

Computer Science & Information Technology

In the Edit Business Card dialog box, you can add, delete, and move ____ to change the look of the business card.

A. fields B. signatures C. contacts D. arrows

Computer Science & Information Technology

The methods of the Character class that begin with ____ return a character that has been converted to the stated format.

A. is B. to C. for D. in

Computer Science & Information Technology