Which of the following activities should take place FIRST when a security patch for Internet software is received from a vendor?

Which of the following activities should take place FIRST when a security patch for Internet software is received from a vendor?
A . The patch should be applied to critical systems.
B . The patch should be validated using a hash algorithm.
C . The patch should be evaluated in a testing environment.
D . The patch should be deployed quickly to systems that are vulnerable.

Answer: C

Latest CISM Dumps Valid Version with 1327 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments