ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 7 Topic 1 Discussion

ECCouncil Certified Threat Intelligence Analyst (CTIA) 312-85 Question # 7 Topic 1 Discussion

312-85 Exam Topic 1 Question 7 Discussion:
Question #: 7
Topic #: 1

What is the correct sequence of steps involved in scheduling a threat intelligence program?

1. Review the project charter

2. Identify all deliverables

3. Identify the sequence of activities

4. Identify task dependencies

5. Develop the final schedule

6. Estimate duration of each activity

7. Identify and estimate resources for all activities

8. Define all activities

9. Build a work breakdown structure (WBS)


A.

1-->9-->2-->8-->3-->7-->4-->6-->5


B.

3-->4-->5-->2-->1-->9-->8-->7-->6


C.

1-->2-->3-->4-->5-->6-->9-->8-->7


D.

1-->2-->3-->4-->5-->6-->7-->8-->9


Get Premium 312-85 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.