Which of the following functions needed to implement the information security program evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?

A. systems testing
B. risk assessment
C. incident response
D. risk treatment


Answer: A

Computer Science & Information Technology

You might also like to view...

A customer wants a report to show the total sales for each salesman in the district, a total of sales for each district in the sales region and the totals sales in each region for the company. You correctly identify this as:

a. A detail report b. A summary report c. An exception report. d. A break report. e. b and d.

Computer Science & Information Technology

Draw a UML model of the team organization of the OWL project for each the three main phases (i.e., initiation, steady state, termination).

What will be an ideal response?

Computer Science & Information Technology

The Picture Size Mode property determines the size of the picture in the form, whereas, the ________ setting retains the original size of the image

A) Clip B) Stretch Horizontal C) Stretch Vertical D) Zoom

Computer Science & Information Technology

How does figure/ground reversal differ from figure/ground ambiguity?

What will be an ideal response?

Computer Science & Information Technology