Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as
A) change management.
B) cloud computing.
C) patch management.
D) user account management.
Correct Answer:
Verified
Q72: New employees of Baker Technologies are assigned
Q73: Identify three ways users can be authenticated
Q74: Residents in Berryhill received an e-mail stating
Q75: New employees of Baker Technologies are assigned
Q76: Which of the following is commonly true
Q78: The most effective way to protect network
Q79: Explain the value of penetration testing.
Q80: Explain social engineering.
Q81: Which of the following is not a
Q82: Who bears the responsibility for information security
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents