Which of the following best describes an assessment?

A) Evidenced-based examination that compares current practices against a specific internal or external criteria
B) A focused privileged inspection to determine condition, locate weakness or vulnerabilities, and identity corrective actions
C) Testing controls by performing vulnerability assessment tests that simulate real attacks
D) Configuring the System and Security logs on each system to record and audit activities


B) A focused privileged inspection to determine condition, locate weakness or vulnerabilities, and identity corrective actions

Computer Science & Information Technology

You might also like to view...

Declaring main as static allows the JVM to invoke main ________.

a. without knowing the name of the class in which main is declared. b. by creating an object of the class in which main is declared. c. without creating an instance of the class in which main is declared. d. None of the above.

Computer Science & Information Technology

In Outline view, body text is text that does not have a heading style applied

Indicate whether the statement is true or false

Computer Science & Information Technology

Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client’s desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When Lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When Lane arrived, she checked to see how much free space the computer had available and found that it had 250GB less than the day before.   What is the issue with the client’s computer?

A. Spam B. Corrupt hard drive C. Bad hard drive driver D. Computer virus

Computer Science & Information Technology

The ____________________ deployment model is almost identical to COBO in that the organization issues mobile devices; however, employees are presented with a whitelist of preaproved applications that they may install.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology