ISSMP®: Information Systems Security Management Professional
Question No. 1
Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?
Choose the correct option from the given list.
01 / 211