Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?
Monitoring the computer hard disks or e-mails of employees pertains to the privacy policy of an organization.
Answer option B is incorrect. The backup policy of a company is related to the backup of its data.
Answer option A is incorrect. The network security policy is related to the security of a company's network.
Answer option D is incorrect. The user password policy is related to passwords that users provide to log on to the network.
Lauran
3 months agoAliza
3 months agoMelvin
3 months agoLuke
4 months agoAlbert
4 months agoCristina
4 months agoHerminia
4 months agoTracie
4 months agoHaydee
5 months agoBulah
5 months agoDorothea
5 months agoLizbeth
5 months agoEmiko
5 months agoBrandon
5 months agoTuyet
5 months agoWei
5 months agoFrancine
5 months agoCristal
9 months agoRosenda
9 months agoMeghan
9 months agoArlette
8 months agoAlyce
8 months agoMargart
8 months agoRoyce
8 months agoCora
8 months agoLoren
8 months agoNina
8 months agoBlair
10 months agoAn
9 months agoMarguerita
9 months agoChau
9 months agoAja
11 months agoSalena
9 months agoMiriam
9 months agoKimberely
9 months agoGail
9 months agoDouglass
11 months agoEstrella
11 months agoVan
11 months ago