List of questions
Related questions
Question 1319 - CISSP discussion
Which of the following vulnerability assessment activities BEST exemplifies the Examine method of assessment?
A.
Ensuring that system audit logs capture all relevant data fields required by the security controls baseline
B.
Performing Port Scans of selected network hosts to enumerate active services
C.
Asking the Information System Security Officer (ISSO) to describe the organization's patch management processes
D.
Logging into a web server using the default administrator account and a default password
Your answer:
0 comments
Sorted by
Leave a comment first