Hmm, this looks like a tricky one. I'll need to carefully read through the options and think about which two certificates are required for CA Signed certificate management.
I'm a little confused by the terminology here. What exactly is a "Vulnerable Item" and how does that relate to a Configuration Item? I'll need to review my notes on ITIL and configuration management to make sure I understand the concepts before attempting this question.
Okay, I've got a plan. I'll review the IT policy with the risk owner to understand the context and rationale behind the control. That should help me make a more informed recommendation to management.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Yvonne
4 months agoTomoko
4 months agoMargot
4 months agoLong
4 months agoSusana
5 months agoChaya
5 months agoMarkus
5 months agoMerissa
5 months agoLouvenia
5 months agoJohnna
5 months agoLoreta
5 months agoThora
5 months ago