Which of the following topics is covered under the operations security CBK domain?

A. Applying the SDLC
B. Establishing secure communication channels
C. Implementing patch and vulnerability management
D. Using digital signatures

Answer: C
Explanation: The Operations security domain covers operational procedures and tools that can be used to eliminate or reduce the capability to exploit critical information. These includes managing incident response and vulnerability management, understanding change and control management, and understanding fault tolerance.

Computer Science & Information Technology

You might also like to view...

If the data you are charting does not have the same amount of time between each data value, use a(n) ________ chart

A) graph B) X-Y scatter C) clustered column D) line

Computer Science & Information Technology

A detailed chain of custody report forms part of ________ specific documentation

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology