GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 205 Topic 21 Discussion

GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 205 Topic 21 Discussion

CEH-001 Exam Topic 21 Question 205 Discussion:
Question #: 205
Topic #: 21

Which of the following lists are valid data-gathering activities associated with a risk assessment?


A.

Threat identification, vulnerability identification, control analysis


B.

Threat identification, response identification, mitigation identification


C.

Attack profile, defense profile, loss profile


D.

System profile, vulnerability identification, security determination


Get Premium CEH-001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.