Which of the following topics is covered under the operations security CBK domain?

A. Applying the SDLC
B. Establishing secure communication channels
C. Implementing patch and vulnerability management
D. Using digital signatures


Answer: C
Explanation: The Operations security domain covers operational procedures and tools that can be used to eliminate or reduce the capability to exploit critical information. These includes managing incident response and vulnerability management, understanding change and control management, and understanding fault tolerance.

Computer Science & Information Technology

You might also like to view...

Business users in particular have responsibilities with respect to the use of networking resources.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What does the size value represent in an array declaration statement?

What will be an ideal response?

Computer Science & Information Technology

To print more than one copy of a document, use the ____________________ spin box.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To ensure that all phone numbers are entered in the same format in every record, apply an input mask to the field

Indicate whether the statement is true or false

Computer Science & Information Technology