All of the following are methods used to conduct risk assessments EXCEPT:

All of the following are methods used to conduct risk assessments EXCEPT:

All of the following are methods used to conduct risk assessments EXCEPT:

A.
penetration tests.

B.
security audits.

C.
vulnerability scans.

D.
disaster exercises.



Leave a Reply 0

Your email address will not be published. Required fields are marked *