Question 230:
What mechanisms are used to identify deficiencies that would provide attackers with an opportunity to compromise a computer system?
Answer options:
A. Business impact analyses B. Security gap analyses C. System performance metrics D. Incident response processes