During which phase of a vulnerability assessment would a security consultant need to document a requirement to retain a legacy device that is no longer supported and cannot be taken offline?

Posted by: Pdfprep Category: CFR-310 Tags: , ,

During which phase of a vulnerability assessment would a security consultant need to document a requirement to retain a legacy device that is no longer supported and cannot be taken offline?
A . Conducting post-assessment tasks
B . Determining scope
C . Identifying critical assets
D . Performing a vulnerability scan

Answer: C

Leave a Reply

Your email address will not be published.