Which of the following lists are valid data-gathering activities associated with a risk assessment?

Which of the following lists are valid data-gathering activities associated with a risk assessment?

Which of the following lists are valid data-gathering activities associated with a risk assessment?

A.
Threat identification, vulnerability identification, control analysis

B.
Threat identification, response identification, mitigation identification

C.
Attack profile, defense profile, loss profile

D.
System profile, vulnerability identification, security determination



Leave a Reply 0

Your email address will not be published. Required fields are marked *