When conducting an audit, what should be done after risk has been scanned for, analyzed, and calculated?
A. Define exactly what should be audited.
B. Create backups.
C. Create a list of vulnerabilities.
D. Develop a plan to mitigate risk.
D. After risk has been scanned for, analyzed, and calculated, a plan should be developed to mitigate those risks.
You might also like to view...
________ can be used to sort the same set of objects in multiple ways
a) insertion sort b) selection sort c) bubble sort d) random sort e) Comparator objects
Why would text be converted into WordArt?
A) To draw attention to the text B) To further explain the text C) To clarify any miscommunicated information D) To replace an animation
Match the following screen elements to their descriptions:
I. Recycle Bin A. The button that displays the two-column list of commands and programs. II. Start button B. A note that provides information about an item. III. Notification area C. A toolbar that displays buttons or icons for programs. IV. ScreenTip D. The taskbar area that contains the clock and system announcements. V. Taskbar E. A temporary location for files you have deleted.
What do you do if a user describes a problem and suggests a solution that you know for a fact is not correct?
A) Humor the person and prove the solution is wrong. B) Take a different course of action, but thank the person for the suggestion. C) Take a moment to teach the person the technical information that shows why the person's solution is wrong. D) Don't mention the person's solution and just troubleshoot the problem.