ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 819 - CISSP discussion

Report
Export

Which of the following needs to be taken into account when assessing vulnerability?

A.
Risk identification and validation
Answers
A.
Risk identification and validation
B.
Threat mapping
Answers
B.
Threat mapping
C.
Risk acceptance criteria
Answers
C.
Risk acceptance criteria
D.
Safeguard selection
Answers
D.
Safeguard selection
Suggested answer: A

Explanation:

Reference:

https://books.google.com.pk/books?id=9gCn86CmsNQC&pg=PA478&lpg=PA478&dq=CISSP+taken+into+account+when+assessing+vulnerability&source=bl&ots=riGvVpNN7I&sig=ACfU3U1isazG0OJlZdAAy91LvAW_rbXdAQ&hl=en&sa=X&ved=2ahUKEwj6p9vg4qnpAhUNxYUKHdODDZ4Q6AEwDHoECBMQAQ#v=onepage&q=CISSP%20taken%20into%20account%20when%20assessing%20vulnerability&f=false

asked 18/09/2024
Emanuele Facchini
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first