ExamQuestions.com

Register
Login
Certified Information Security Manager Exam Questions

Isaca

Certified Information Security Manager

353 / 500

Question 353:

Which of the following processes can be used to remediate identified technical vulnerabilities? 

Answer options:

A. Running baseline configurations
B. Conducting a risk assessment
C. Performing a business impact analysis (BIA)
D. Running automated scanners