which of the following activities is MOST likely to lea…

In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of
weaknesses in security software?

In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of
weaknesses in security software?

A.
Applying patches

B.
Changing access rules

C.
Upgrading hardware

D.
Backing up files

Explanation:

Security software will generally have a well-controlled process for applying patches, backing up files and upgrading hardware. The greatest risk occurs when access rules are changed since they are susceptible to being opened up too much, which can result in the creation of a security exposure.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

4 × 2 =