Which of the following processes would the scan results MOST likely feed into?

An IS auditor is reviewing an organization’s network vulnerability scan results.

Which of the following processes would the scan results MOST likely feed into?
A . Firewall maintenance
B . Patch management
C . Incident response
D . Traffic management

Answer: A

Latest CISA Dumps Valid Version with 2694 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments