Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that system and trigger a recertification activity are documented in the

Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that
system and trigger a recertification activity are documented in the

Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that
system and trigger a recertification activity are documented in the

A.
security impact analysis.

B.
structured code review.

C.
routine self assessment.

D.
cost benefit analysis.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

sixteen − 15 =