PdfPrep.com

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
A . Vulnerability scanning
B . Penetration testing
C . Systems log correlation analysis
D . Monitoring of intrusion detection system (IDS) alerts

Answer: B

Exit mobile version