Maintaining and improving the information security risk management process in response to incidents is part of the _________ step.

A. act B. plan

C. check D. do

A. act

Computer Science & Information Technology

You might also like to view...

If the variable named GRADE has a value of 95, which of the following statements will cause the line 95 is above average to be output?

a) Write “GRADE is above average” b) Write GRADE is above average c) Write GRADE, “is above average” d) Write “GRADE, is above average”

Computer Science & Information Technology

Which of the following statements is false?

a) Before submitting your apps for publication or In-App Products (i.e., virtual goods for in-app purchase), make sure that they comply with Microsoft’s requirements for Windows Phone apps. b) Apps that fail to meet Microsoft’s requirements will be rejected—for example if the app includes illegal content, contains pornography or obscene content, encourages harm or violence to others, prevents the user from disabling location services, sells competing mobile services, contains defamatory or threatening content, infringes on trademarks of others and more. c) Once you publish a Windows Phone 8 app, Microsoft requires exclusive rights—you may not republish your app on app stores for other smartphone platforms. d) Microsoft’s app approval process is similar to Apple’s strict process for iOS apps and different from Google’s Android process where apps are not vetted, but they could be removed after the fact.

Computer Science & Information Technology