Why is a security impact assessment performed as part of a change management process?

A. To find out if sufficient funds have been allocated to the security function
B. To review the level of security against the efforts involved in testing change
C. To determine the likelihood of downtime or security reduction caused by a potential change
D. To assess compliance with regulations


Answer: C. To determine the likelihood of downtime or security reduction caused by a potential change

Computer Science & Information Technology

You might also like to view...

Create a PL/SQL block to increase salary of employees in department 10. The salary increase is 15% for the employees making less than $100,000 and 10% for the employees making $100,000 or more. Use a cursor with a FOR UPDATE clause. Update the salary with a WHERE CURRENT OF clause in a cursor FOR loop (cursor FOR loop problem).

What will be an ideal response?

Computer Science & Information Technology

To ____ an object means to turn it around an axis or center point.

A. align B. rotate C. reflect D. invert

Computer Science & Information Technology

A(n) ________ is a value that can be changed, rather than specific, defined criteria

Fill in the blank(s) with correct word

Computer Science & Information Technology

The MONTH function returns the name of the month. For example 11/11/2013 would return November

Indicate whether the statement is true or false.

Computer Science & Information Technology