List of questions
Related questions
Question 27 - IT Risk Fundamentals discussion
Which of the following are control conditions that exist in IT systems and may be exploited by an attacker?
A.
Cybersecurity risk scenarios
B.
Vulnerabilities
C.
Threats
Your answer:
0 comments
Sorted by
Leave a comment first