Which of the following functions needed to implement the information security program evaluates patches used to close software vulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?
A. systems testing
B. risk assessment
C. incident response
D. risk treatment
Answer: A
Computer Science & Information Technology
You might also like to view...
A ________ such as a calendar is a predesigned file that includes formatting elements and may include some content
A) style B) template C) theme D) layout
Computer Science & Information Technology
The arrow operator (->) combines the actions of which two operators?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology