Which of the following steps for risk assessment methodology refers to vulnerability identification?

Which of the following steps for risk assessment methodology refers to vulnerability identification?
A . Determines if any flaws exist in systems, policies, or procedures
B . Assigns values to risk probabilities; Impact values.
C . Determines risk probability that vulnerability will be exploited (High. Medium, Low)
D . Identifies sources of harm to an IT system. (Natural, Human. Environmental)

Answer: C

Latest CPEH-001 Dumps Valid Version with 736 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments