Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?
Monitoring the computer hard disks or e-mails of employees pertains to the privacy policy of an organization.
Answer option B is incorrect. The backup policy of a company is related to the backup of its data.
Answer option A is incorrect. The network security policy is related to the security of a company's network.
Answer option D is incorrect. The user password policy is related to passwords that users provide to log on to the network.
Aja
18 days agoDouglass
22 days agoEstrella
24 days agoVan
25 days ago