List of questions
Related questions
Question 218 - 312-50v12 discussion
Which of the following steps for risk assessment methodology refers to vulnerability identification?
A.
Determines if any flaws exist in systems, policies, or procedures
B.
Assigns values to risk probabilities; Impact values.
C.
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
D.
Identifies sources of harm to an IT system. (Natural, Human. Environmental)
Your answer:
0 comments
Sorted by
Leave a comment first