Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

Advertisement 

Certified Ethical Hacker v10 Question of the Day #21

Written by  Feb 07, 2019

NO.21 Which of the following lists are valid data-gathering activities associated with a risk
assessment?
A. Threat identification, vulnerability identification, control analysis
B. Threat identification, response identification, mitigation identification
C. Attack profile, defense profile, loss profile
D. System profile, vulnerability identification, security determination

 

 

 

 

Scroll down for answer

 

 

 

Advertisement 

 

Answer: A

 

More Answers

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

Advertisement 
Daily Steals Free Shipping!

IT Security News UK

Advertisement 
cyber News

  1. Popular
  2. Trending
  3. Comments

Advertisement