Which of the following lists are valid data-gathering activities associated with a risk assessment?

Which of the following lists are valid data-gathering activities associated with a risk assessment?

Which of the following lists are valid data-gathering activities associated with a risk assessment?

A.
Threat identification,vulnerability identification,control analysis

B.
Threat identification,response identification,mitigation identification

C.
Attack profile,defense profile,loss profile

D.
System profile,vulnerability identification,security determination



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ghost Man

Ghost Man

D is the Ans.