Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities…?

Which of the following processes will you involve to perform the active analysis of the system for
any potential vulnerabilities that may result from poor or improper system configuration, known
and/or unknown hardware or software flaws, or operational weaknesses in process or technical
countermeasures?

Which of the following processes will you involve to perform the active analysis of the system for
any potential vulnerabilities that may result from poor or improper system configuration, known
and/or unknown hardware or software flaws, or operational weaknesses in process or technical
countermeasures?

A.
Penetration testing

B.
Risk analysis

C.
Baselining

D.
Compliance checking



Leave a Reply 0

Your email address will not be published. Required fields are marked *