List of questions
Related questions
Question 409 - 312-38 discussion
John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________.
A.
Mitigation, Security policies
B.
Verification, Security Policies
C.
Vulnerability scanning, Risk Analysis
D.
Risk analysis, Risk matrix
Your answer:
0 comments
Sorted by
Leave a comment first