(ISC)2(ISC)2
CISSP-ISSMP · Question #83
CISSP-ISSMP Question #83: Real Exam Question with Answer & Explanation
Sign in or unlock CISSP-ISSMP to reveal the answer and full explanation for question #83. The question stem and answer options stay visible for context.
Security Operations Management
Question
Which of the following processes will you involve to perform the active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures?
Options
- APenetration testing
- BRisk analysis
- CBaselining
- DCompliance checking
Unlock CISSP-ISSMP to see the answer
You've previewed enough free CISSP-ISSMP questions. Unlock CISSP-ISSMP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Penetration Testing#Vulnerability Assessment#Security Testing#Security Operations