The ____ is primarily responsible for ensuring that configuration management practices are effective, and that security controls built into the process identify and mitigate any vulnerabilities induced during the lifecycle of the system.

A. IT security compliance officer
B. IT security of operations professional
C. digital forensics professional
D. IT risk professional

Answer: B

Computer Science & Information Technology

You might also like to view...

The is-a relationship represents.

a. Composition. b. Inheritance. c. Information Hiding. d. A friend.

Computer Science & Information Technology

Used to display information in a sequential order

Computer Science & Information Technology