When conducting an audit, what should be done after risk has been scanned for, analyzed, and calculated?
A. Define exactly what should be audited.
B. Create backups.
C. Create a list of vulnerabilities.
D. Develop a plan to mitigate risk.
D. After risk has been scanned for, analyzed, and calculated, a plan should be developed to mitigate those risks.
Computer Science & Information Technology
You might also like to view...
You can export your customized Ribbon by creating what type of file?
A) Office User Interface (UI) customization file B) Office Application Interface (AI) customization file C) Custom Application Interface (CAI) customization file D) Custom Ribbon Interface (RI) customization file
Computer Science & Information Technology
Which Cisco IOS command would be used to configure a router subinterface to handle any native VLAN traffic?
A) dot1q native B) vlan vlan-id native C) native vlan D) encapsulation dot1q vlan-id native
Computer Science & Information Technology