Company A and B are merging, with the security administrator for Company A becoming head of IT. In which of the following scenarios would the first step be to perform a vulnerability assessment of the Company B's network?
A. The two networks must be joined.
B. An application used by Company B must be integrated by Company A.
C. The two networks have overlapping IP address ranges.
D. An attack is under way in Company A's network.
A
Explanation: The first step should be to assess any vulnerabilities that exist in company B's network, so when they are joined, the issue will not be transferred to Company A's network.
You might also like to view...
Match the following terms to their meanings:
I. Landscape A. Type of page orientation that is used for ordinary text II. Section break B. Part of a document that is formatted differently than the rest III. Portrait of the document IV. Section C. Used to divide a document into multiple segments V. Next page D. A type of page orientation sometimes used for charts E. A type of section break
Which of the following can be used to zoom in and see an entire calculated field expressions?
A) F2 B) Shift + F2 C) F4 D) Shift + F4