Which of the following should occur FIRST in the process of managing security risk associated with the transfer of data from unsupported legacy systems to supported systems?

Which of the following should occur FIRST in the process of managing security risk associated with the transfer of data from unsupported legacy systems to supported systems?
A. Make backups of the affected systems prior to transfer.
B. Increase cyber insurance coverage.
C. Identify all information assets in the legacy environment.
D. Assign owners to be responsible for the transfer of each asset.

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.