In which risk assessment stage does the security auditor map the systems and resources on a
network?
A.
Activation
B.
Penetration
C.
Discovery
D.
Cancellation
In which risk assessment stage does the security auditor map the systems and resources on a
network?
In which risk assessment stage does the security auditor map the systems and resources on a
network?
A.
Activation
B.
Penetration
C.
Discovery
D.
Cancellation