Submitting the report is part of which of the following test phases of the security assessment?

a. Scope the assessment.
b. Perform the assessment.
c. Post assessment activities.
d. Establish goals.


ANS: C

Computer Science & Information Technology

You might also like to view...

A(n) Shared folder is similar to a drop box; it can hold files and folders that you want to share with other people on your network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Unlike the Name property that must not contain spaces, the ________ property in Visual Basic allows multiple words

Fill in the blank(s) with correct word

Computer Science & Information Technology

Network Monitor enables you to __________________ as they are transmitted over a network to all network adapter cards on your computer

a. Capture, view, and analyze frames (packets) b. Alter frames c. Decrypt frames d. Encrypt frames

Computer Science & Information Technology

A security administrator has been assigned to review the security posture of the standard corporate system image for virtual machines. The security administrator conducts a thorough review of the system logs, installation procedures, and network configuration of the VM image. Upon reviewing the access logs and user accounts, the security administrator determines that several accounts will not be used in production.Which of the following would correct the deficiencies?

A. Mandatory access controls B. Disable remote login C. Host hardening D. Disabling services

Computer Science & Information Technology