Question 239:
A company`s mail server allows anonymous file transfer protocol (FTP) access which could be exploited. What process should the information security manager deploy to determine the necessity for remedial action?
Answer options:
A. A penetration test B. A security baseline review C. A risk assessment D. A business impact analysis (BIA)