Which of the following security activities should be implemented in the change management process to identify key vulnerabilities introduced by changes?

Which of the following security activities should be implemented in the change management
process to identify key vulnerabilities introduced by changes?

Which of the following security activities should be implemented in the change management
process to identify key vulnerabilities introduced by changes?

A.
Business impact analysis (BIA)

B.
Penetration testing

C.
Audit and review

D.
Threat analysis

Explanation:

Penetration testing focuses on identifying vulnerabilities. None of the other choices would identify
vulnerabilities introduced by changes.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ali imran

Ali imran

Penetration testing focuses on exploiting vulnerabilities not identifying them , it should be vulnerability scanning to be exact