According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*
I'm confident that B (Backup or restore data) and D (Security hardening of the host) are the correct answers here. Those activities are clearly within the scope of information security operations and maintenance management.
Okay, let's see. Participating in security training and developing an emergency response plan seem more like general security practices, not necessarily operations and maintenance. Backing up and restoring data, as well as security hardening, seem more directly related to the operations and maintenance aspect.
Hmm, I'm a bit unsure about this one. I'll need to carefully read through the options and think about which ones are specifically related to operations and maintenance, rather than other security activities.
This question seems pretty straightforward. I think the key is to focus on the "information security operation and maintenance management" part of the question.
Terina
3 months agoHermila
3 months agoVirgina
4 months agoOliva
4 months agoKenneth
4 months agoRessie
4 months agoDorothy
4 months agoLeonora
4 months agoEdna
5 months agoRoosevelt
5 months agoAngelo
5 months agoJustine
5 months agoTroy
5 months agoFelix
5 months agoTwana
5 months ago