00:00

QUESTION 96

- (Exam Topic 4)
What is the FIRST step in developing the vulnerability management program?

Correct Answer: A

QUESTION 97

- (Exam Topic 5)
Which of the following best describes an access control process that confirms the identity of the entity seeking access to a logical or physical area?

Correct Answer: B

QUESTION 98

- (Exam Topic 6)
What is an approach to estimating the strengths and weaknesses of alternatives used to determine options, which provide the BEST approach to achieving benefits while preserving savings called?

Correct Answer: D
Reference: https://artsandculture.google.com/entity/cost%E2%80%93benefit-analysis/m020w0x?hl=en

QUESTION 99

- (Exam Topic 1)
Risk that remains after risk mitigation is known as

Correct Answer: B

QUESTION 100

- (Exam Topic 6)
Which of the following strategies provides the BEST response to a ransomware attack?

Correct Answer: B