Which of the following processes should be followed?

A security policy states that all applications on the network must have a password length of eight characters.
There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in
six months, and two are not expected to be upgraded or removed from the network. Which of the following
processes should be followed?

A security policy states that all applications on the network must have a password length of eight characters.
There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in
six months, and two are not expected to be upgraded or removed from the network. Which of the following
processes should be followed?

A.
Establish a risk matrix

B.
Inherit the risk for six months

C.
Provide a business justification to avoid the risk

D.
Provide a business justification for a risk exception



Leave a Reply 0

Your email address will not be published. Required fields are marked *