You have documented several possible solutions to a security issue that occurred last week. You need to test all the possible solutions to see the effect that each has and to determine which to deploy. Which is the most important guideline should you follow?

A. Maintain adequate bandwidth while testing each solution.
B. Test each solution under the same conditions.
C. Patch all lab computers prior to testing each solution.
D. Determine the acceptable false positive maximum.


B
Explanation: You should test each solution under the same conditions. This ensures that each solution will be assessed fairly in comparison to the others.
While all of the other options should be considered, they are not as important as testing each solution under the same conditions.

Computer Science & Information Technology

You might also like to view...

What is the value of z after the following statements have been executed?

int x = 4, y = 33; double z; z = (double) (y / x); a. 8.25 b. 4 c. 0 d. 8.0

Computer Science & Information Technology

The DAY(date) function is used to _____.?

A. ?extract the day of the month from the date value B. ?return the day in the date value where 1=Monday, 2=Tuesday, and so forth C. ?create a date value for the date represented by the year, month, and day arguments D. ?display the current date and time

Computer Science & Information Technology

To use the AutoCalculate area, select the range of cells containing the numbers for a calculation you want to verify and then double-click the AutoCalculate area to display the AutoCalculate shortcut menu.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When setting software restriction policies, there are four types of new rules in the Additional Rules folder. They are _________________

a. Certificate Rule, Hash Rule, Network Zone Rule, and Path Rule b. Certificate Rule, Hash Rule, System Rule, and Path Rule c. Certificate Rule, Hash Rule, Network Zone Rule, and Domain Rule d. Read Only Rule, Hash Rule, Network Zone Rule, and Path Rule

Computer Science & Information Technology