1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
5

Which of the following functions needed to implement the information security program evaluates patches used to close software v

ulnerabilities and acceptance testing of new systems to assure compliance with policy and effectiveness?
a. Systems testing
b. Risk assessment
c. Incident response
d. Systems security administration
Computers and Technology
1 answer:
solong [7]3 years ago
6 0

Answer:

a. Systems testing

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being defined is called System Testing. Like mentioned in the question, this is a technique used in order to evaluate the complete system the system's compliance against specified requirements, which tests its functionalities from an end-to-end perspective in order to evaluates patches used to close software vulnerabilities and make sure it complies with all policies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Who needs to be involved when assembling business solutions that include hardware and software?
sveta [45]
Software engineer i would say
5 0
3 years ago
Read 2 more answers
2. Which of the following statements accurately describes enzymes? A. Enzymes increase the activation energy of reactions. B. Te
Bas_tet [7]
B.temperatute and pH can affect how enzymes work
5 0
2 years ago
An effective team would never have ______.
inysia [295]
An ineffective leader
3 0
3 years ago
How can you different between standard and protocol?
Verizon [17]
A standard is something that is always at a certain time of the day and is scheduled the same. A protocol takes priority of anything and everything else you work on.
6 0
2 years ago
When you create an internal hyperlink, you create the link that points to the bookmark using the anchor tag with which attribute
abruzzese [7]
You use the href attribute. <a href="apage.html"> My Page</a>
7 0
3 years ago
Other questions:
  • ​Which SQL keyword is used to search for records?
    8·1 answer
  • A(n) ____________________ is a set of programs that coordinates all the activities among computer or mobile device hardware.
    10·1 answer
  • You can use this effect to break a color into a percentage of its full strength.
    13·1 answer
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Select the correct answer
    11·1 answer
  • A library function that can find one string inside another is:
    9·1 answer
  • In Vista and Windows 7, the Appearance and Personalization option allows you to change the
    14·1 answer
  • There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
    7·1 answer
  • How come I haven't moved to the next rank even though I have all of the right things to move on?
    10·2 answers
  • How are the waterfall and agile methods of software development similar?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!