Which of the following lists are valid data-gathering activities associated with a risk assessment?

Posted by: Pdfprep Category: 312-50v10 Tags: , ,

Which of the following lists are valid data-gathering activities associated with a risk assessment?
A . Threat identification, vulnerability identification, control analysis
B . Threat identification, response identification, mitigation identification
C . Attack profile, defense profile, loss profile
D . System profile, vulnerability identification, security determination

Answer: A

Leave a Reply

Your email address will not be published.