ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 409 - 312-38 discussion

Report
Export

John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________.

A.
Mitigation, Security policies
Answers
A.
Mitigation, Security policies
B.
Verification, Security Policies
Answers
B.
Verification, Security Policies
C.
Vulnerability scanning, Risk Analysis
Answers
C.
Vulnerability scanning, Risk Analysis
D.
Risk analysis, Risk matrix
Answers
D.
Risk analysis, Risk matrix
Suggested answer: D
asked 18/09/2024
PATRICK ADUSEI
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first