Multiple Choice
Which of the following is not an example of vulnerability within the process of IT operations?
A) Software not patched.
B) Inappropriate data classification.
C) Ineffective training.
D) Poor firewall rules.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q11: What could result from the failure to
Q12: The symmetric-key encryption method is used to
Q13: Which of the following describes the primary
Q14: Which of the following statements regarding authentication
Q15: Which of the following is not an
Q17: Encryption is a preventive control ensuring data
Q18: Which of the following IT controls would
Q19: For businesses considering a cloud computing solution,which
Q20: A Certificate Authority (CA)issues digital certificates to
Q21: Which of the following best illustrates the