What is the last step before an information system is placed into operation?
a. Move to Activity 5 in the Enterprise Information Technology Defense Repository (EITDR)
b. The explicit acceptance of risk by the authorizing official
c. Replacement of all CMOS batteries on Desktop and Laptop computers to provide the greatest amount protection against loss of BIOS information
d. The explicit acceptance of risk by the authorizing official and the CIO