ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 88 Topic 9 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 88 Topic 9 Discussion

312-50v13 Exam Topic 9 Question 88 Discussion:
Question #: 88
Topic #: 9

Which of the following steps for risk assessment methodology refers to vulnerability identification?


A.

Determines if any flaws exist in systems, policies, or procedures


B.

Assigns values to risk probabilities; Impact values


C.

Determines risk probability that vulnerability will be exploited (High, Medium, Low)


D.

Identifies sources of harm to an IT system (Natural, Human, Environmental)


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.