Hmm, this looks like a tricky one. I'll need to carefully read through the options and think about which two certificates are required for CA Signed certificate management.
I'm a little confused by the terminology here. What exactly is a "Vulnerable Item" and how does that relate to a Configuration Item? I'll need to review my notes on ITIL and configuration management to make sure I understand the concepts before attempting this question.
Okay, I've got a plan. I'll review the IT policy with the risk owner to understand the context and rationale behind the control. That should help me make a more informed recommendation to management.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Yvonne
5 months agoTomoko
6 months agoMargot
6 months agoLong
6 months agoSusana
6 months agoChaya
6 months agoMarkus
6 months agoMerissa
6 months agoLouvenia
6 months agoJohnna
6 months agoLoreta
6 months agoThora
6 months ago