ExamGecko
Question list
Search
Search

Related questions











Question 218 - 312-50v12 discussion

Report
Export

Which of the following steps for risk assessment methodology refers to vulnerability identification?

A.
Determines if any flaws exist in systems, policies, or procedures
Answers
A.
Determines if any flaws exist in systems, policies, or procedures
B.
Assigns values to risk probabilities; Impact values.
Answers
B.
Assigns values to risk probabilities; Impact values.
C.
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
Answers
C.
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
D.
Identifies sources of harm to an IT system. (Natural, Human. Environmental)
Answers
D.
Identifies sources of harm to an IT system. (Natural, Human. Environmental)
Suggested answer: C
asked 18/09/2024
Lukasz Malaczek
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first