You have documented several possible solutions to a security issue that occurred last week. You need to test all the possible solutions to see the effect that each has and to determine which to deploy. Which is the most important guideline should you follow?

A. Maintain adequate bandwidth while testing each solution.
B. Test each solution under the same conditions.
C. Patch all lab computers prior to testing each solution.
D. Determine the acceptable false positive maximum.

B
Explanation: You should test each solution under the same conditions. This ensures that each solution will be assessed fairly in comparison to the others.
While all of the other options should be considered, they are not as important as testing each solution under the same conditions.

Computer Science & Information Technology

You might also like to view...

Match the following e-mail components with their purpose:

I. Reply II. Reply all III. Forward IV. To: V. Cc: A. generates new e-mail message including original attachments B. e-mail address of primary recipients C. e-mail address of secondary recipients D. generates new e-mail message to the author E. generates new e-mail message to the author plus copied recipients

Computer Science & Information Technology

Startup programs will always prompt the user before running

Indicate whether the statement is true or false

Computer Science & Information Technology