List of questions
Related questions
Question 510 - 312-38 discussion
Which ofthe follow ng things need to be identified during attack surface visualization?
A.
Attacker's tools, techniques, and procedures
B.
Authentication, authorization, and auditing in networks
C.
Regulatory frameworks, standards and, procedures for organizations
D.
Assets, topologies, and policies ofthe organization
Your answer:
0 comments
Sorted by
Leave a comment first