Information technology managers are often in a bind when a new exploit is discovered in the wild. They can respond by updating the affected software or hardware with new code provided by the manufacturer, which runs the risk that a flaw in the update will break the system. Or they can wait until the new code has been extensively tested, but that runs the risk that they will be compromised by the

exploit during the testing period. Dealing with these issues is referred to as

A) change management.
B) cloud computing.
C) patch management.
D) user account management.

Answer: C

Business

You might also like to view...

George is buying his first house. He has found two houses that he thinks he likes. He is highly involved in the purchase and knows that making the wrong choice could affect him for years to come. George will likely undertake ________

A) limited problem solving B) significant problem solving C) opinion leadership D) routine response problem solving E) norm-seeking behavior

Business

Fraudulent practices and other abuses of private pension funds led Congress to enact the ________

A) Federal Deposit Insurance Corporation Act B) Employee Retirement Income Security Act C) Federal Reserve Act D) Social Security Act

Business