All of the following are methods used to conduct risk assessments EXCEPT:
A.
penetration tests.
B.
security audits.
C.
vulnerability scans.
D.
disaster exercises.
All of the following are methods used to conduct risk assessments EXCEPT:
All of the following are methods used to conduct risk assessments EXCEPT:
A.
penetration tests.
B.
security audits.
C.
vulnerability scans.
D.
disaster exercises.