Isaca IT Risk Fundamentals Certificate Exam IT-Risk-Fundamentals Question # 16 Topic 2 Discussion

Isaca IT Risk Fundamentals Certificate Exam IT-Risk-Fundamentals Question # 16 Topic 2 Discussion

IT-Risk-Fundamentals Exam Topic 2 Question 16 Discussion:
Question #: 16
Topic #: 2

Which of the following is an example of an inductive method to gather information?


A.

Vulnerability analysis


B.

Controls gap analysis


C.

Penetration testing


Get Premium IT-Risk-Fundamentals Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.