As your company's security analyst, you have recently deployed several new security controls as a result of research that you completed. After deploying the controls, you ensure that the controls meet the business needs for which they were deployed. What is the last step of this process?
A. Perform a cost-benefit analysis.
B. Conduct a lessons learned report.
C. Create benchmarks, and compare to baselines.
D. Test multiple solutions.
B
Explanation: The last step of any process is to conduct a lessons learned report.
All of the other steps should have already been completed prior to or during the deployment of the new security controls.
Computer Science & Information Technology
You might also like to view...
A ________ facilitates collaboration among people in an organization
A) top-level site B) public site C) team site D) subsite
Computer Science & Information Technology
In Office 2013, Excel files are saved with ____ extensions.
A. .xlsx B. .docx C. .exlx D. .excl
Computer Science & Information Technology