ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 855 - CISSP discussion

Report
Export

Which of the following activities is MOST likely to be performed during a vulnerability assessment?

A.
Establish caller authentication procedures to verify the identities of users.
Answers
A.
Establish caller authentication procedures to verify the identities of users.
B.
Analyze the environment by conducting interview sessions with relevant parties.
Answers
B.
Analyze the environment by conducting interview sessions with relevant parties.
C.
Document policy exceptions required to access systems in non-compliant areas.
Answers
C.
Document policy exceptions required to access systems in non-compliant areas.
D.
Review professorial credentials of the vulnerability assessment team or vendor.
Answers
D.
Review professorial credentials of the vulnerability assessment team or vendor.
Suggested answer: D
asked 18/09/2024
Sivakumar Balasundram
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first