List of questions
Related questions
Question 855 - CISSP discussion
Which of the following activities is MOST likely to be performed during a vulnerability assessment?
A.
Establish caller authentication procedures to verify the identities of users.
B.
Analyze the environment by conducting interview sessions with relevant parties.
C.
Document policy exceptions required to access systems in non-compliant areas.
D.
Review professorial credentials of the vulnerability assessment team or vendor.
Your answer:
0 comments
Sorted by
Leave a comment first