Posted by: Pdfprep
Post Date: June 30, 2021
Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
A . Vulnerability scanning
B . Penetration testing
C . Systems log correlation analysis
D . Monitoring of intrusion detection system (IDS) alerts
Answer: B
Leave a Reply