Which of the following topics is covered under the operations security CBK domain?
A. Applying the SDLC
B. Establishing secure communication channels
C. Implementing patch and vulnerability management
D. Using digital signatures
Answer: C
Explanation: The Operations security domain covers operational procedures and tools that can be used to eliminate or reduce the capability to exploit critical information. These includes managing incident response and vulnerability management, understanding change and control management, and understanding fault tolerance.
You might also like to view...
If the data you are charting does not have the same amount of time between each data value, use a(n) ________ chart
A) graph B) X-Y scatter C) clustered column D) line
A detailed chain of custody report forms part of ________ specific documentation
Fill in the blank(s) with the appropriate word(s).