اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 181 من 270

كل الأسئلة

In a risk assessment methodology, which step refers to vulnerability identification according to the exam’s mapping?

الخيارات

  • A Determines if any flaws exist in systems, policies, or procedures
  • B Assigns values to risk probabilities; impact values
  • C Determines risk probability that vulnerability will be exploited (High, Medium, Low)
  • D Identifies sources of harm to an IT system (Natural, Human, Environmental)

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.