Question: Information technology managers are often in a bind when a new exploit is discovered in the wild. They can respond by updating the affected software
Information technology managers are often in a bind when a new exploit is discovered in the wild. They can respond by updating the affected software or hardware with new code provided by the manufacturer, which runs the risk that a flaw in the update will break the system. Or they can wait until the new code has been extensively tested, but that runs the risk that they will be compromised by the exploit during the testing period. Dealing with these issues is referred to as
Please provide your answer in the rich text box.
AChange management
BHardening
CPatch management
DDefense in depth
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
