Question 353:
Which of the following processes can be used to remediate identified technical vulnerabilities?
Answer options:
A. Running baseline configurations B. Conducting a risk assessment C. Performing a business impact analysis (BIA) D. Running automated scanners