Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?

Posted by: Pdfprep Category: CRISC Tags: , ,

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
A . Vulnerability scanning
B . Penetration testing
C . Systems log correlation analysis
D . Monitoring of intrusion detection system (IDS) alerts

Answer: B

Leave a Reply

Your email address will not be published.