PdfPrep.com

What is the next step in the vulnerability assessment process?

Network infrastructure has been scanned and the identified issues have been remediated.

What is the next step in the vulnerability assessment process?
A . Generating reports
B . Establishing scope
C . Conducting an audit
D . Assessing exposures

Answer: C

Explanation:

Reference: https://www.ogcio.gov.hk/en/our_work/information_cyber_security/government/doc/ISPG­SM01.pdf

Exit mobile version