John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a________and it has to adhere to the_________

Posted by: Pdfprep Category: 312-38 Tags: , ,

John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a________and it has to adhere to the_________
A . Verification, Security Policies
B . Mitigation, Security policies
C . Vulnerability scanning, Risk Analysis
D . Risk analysis, Risk matrix

Answer: A

Leave a Reply

Your email address will not be published.