Which of the following functions needed to implement the information security program evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?
A. systems testing
B. risk assessment
C. incident response
D. risk treatment
Answer: A
You might also like to view...
A customer wants a report to show the total sales for each salesman in the district, a total of sales for each district in the sales region and the totals sales in each region for the company. You correctly identify this as:
a. A detail report b. A summary report c. An exception report. d. A break report. e. b and d.
Draw a UML model of the team organization of the OWL project for each the three main phases (i.e., initiation, steady state, termination).
What will be an ideal response?
The Picture Size Mode property determines the size of the picture in the form, whereas, the ________ setting retains the original size of the image
A) Clip B) Stretch Horizontal C) Stretch Vertical D) Zoom
How does figure/ground reversal differ from figure/ground ambiguity?
What will be an ideal response?