What is the final step in assessing the risk of network intrusion from an internal or external source?
A.
Using the existing management and control architecture
B.
Evaluating the existing perimeter and internal security 1D0-470
C.
Analyzing, categorizing and prioritizing resources
D.
Considering the business concerns
Explanation:
All four proposed answers are part of the risk assessment. What I am going to do is list them in the proper order:
Analyzing, categorizing and prioritizing resources Considering the business concerns
Evaluating the existing perimeter and internal security Using the existing management and control architecture