Which of the following topics is covered under the operations security CBK domain?
A. Applying the SDLC
B. Establishing secure communication channels
C. Implementing patch and vulnerability management
D. Using digital signatures
Answer: C
Explanation: The Operations security domain covers operational procedures and tools that can be used to eliminate or reduce the capability to exploit critical information. These includes managing incident response and vulnerability management, understanding change and control management, and understanding fault tolerance.
You might also like to view...
Business users in particular have responsibilities with respect to the use of networking resources.
Answer the following statement true (T) or false (F)
What does the size value represent in an array declaration statement?
What will be an ideal response?
To print more than one copy of a document, use the ____________________ spin box.
Fill in the blank(s) with the appropriate word(s).
To ensure that all phone numbers are entered in the same format in every record, apply an input mask to the field
Indicate whether the statement is true or false