- (Exam Topic 4)
What is the FIRST step in developing the vulnerability management program?
Correct Answer:
A
- (Exam Topic 5)
Which of the following best describes an access control process that confirms the identity of the entity seeking access to a logical or physical area?
Correct Answer:
B
- (Exam Topic 6)
What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?
Correct Answer:
D
Reference: https://artsandculture.google.com/entity/cost%E2%80%93benefit-analysis/m020w0x?hl=en
- (Exam Topic 1)
Risk that remains after risk mitigation is known as
Correct Answer:
B
- (Exam Topic 6)
Which of the following strategies provides the BEST response to a ransomware attack?
Correct Answer:
B