READ Free Dumps For ECCouncil- 312-50
Question ID 6870 | Which of the following lists are valid data-gathering activities associated with a risk assessment? |
Option A | Threat identification, vulnerability identification, control analysis |
Option B | Threat identification, response identification, mitigation identification |
Option C | Attack profile, defense profile, loss profile |
Option D | System profile, vulnerability identification, security determination |
Correct Answer | a |
Question ID 6871 | A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of |
Option A | white box |
Option B | grey box |
Option C | r e d |
Option D | black box |
Correct Answer | d |