When conducting an audit, what should be done after risk has been scanned for, analyzed, and calculated?

A. Define exactly what should be audited.
B. Create backups.
C. Create a list of vulnerabilities.
D. Develop a plan to mitigate risk.


D. After risk has been scanned for, analyzed, and calculated, a plan should be developed to mitigate those risks.

Computer Science & Information Technology

You might also like to view...

________ can be used to sort the same set of objects in multiple ways

a) insertion sort b) selection sort c) bubble sort d) random sort e) Comparator objects

Computer Science & Information Technology

Why would text be converted into WordArt?

A) To draw attention to the text B) To further explain the text C) To clarify any miscommunicated information D) To replace an animation

Computer Science & Information Technology

Match the following screen elements to their descriptions:

I. Recycle Bin A. The button that displays the two-column list of commands and programs. II. Start button B. A note that provides information about an item. III. Notification area C. A toolbar that displays buttons or icons for programs. IV. ScreenTip D. The taskbar area that contains the clock and system announcements. V. Taskbar E. A temporary location for files you have deleted.

Computer Science & Information Technology

What do you do if a user describes a problem and suggests a solution that you know for a fact is not correct?

A) Humor the person and prove the solution is wrong. B) Take a different course of action, but thank the person for the suggestion. C) Take a moment to teach the person the technical information that shows why the person's solution is wrong. D) Don't mention the person's solution and just troubleshoot the problem.

Computer Science & Information Technology