Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as
A) change management.
B) hardening.
C) patch management.
D) defense in depth.
Correct Answer:
Verified
Q24: Which of the following is not a
Q37: Which of the following is an example
Q39: Perimeter defense is an example of which
Q40: Identify the best description of an access
Q42: On April 1,2012,students enrolled in an economics
Q44: Which of the below keeps a record
Q50: The process that uses automated tools to
Q51: Compatibility tests utilize a(n)_,which is a list
Q65: All employees of E.C.Hoxy are required to
Q68: The _ disseminates information about fraud,errors,breaches and
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents