Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the critical assets…?

Which vulnerability assessment phase describes the scope of the assessment, identifies and
ranks the critical assets, and creates proper information protection procedures such as
effective planning, scheduling, coordination, and logistics?

Which vulnerability assessment phase describes the scope of the assessment, identifies and
ranks the critical assets, and creates proper information protection procedures such as
effective planning, scheduling, coordination, and logistics?

A.
Threat-Assessment Phase

B.
Pre-Assessment Phase

C.
Assessment Phase

D.
Post-Assessment Phase



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Abuzer

Abuzer

“B” (ECSAv8 Module 09 Vulnerability Analysis page 283)