Which of the following lists are valid data-gathering activities associated with a risk assessment?
A.
Threat identification,vulnerability identification,control analysis
B.
Threat identification,response identification,mitigation identification
C.
Attack profile,defense profile,loss profile
D.
System profile,vulnerability identification,security determination
A