Easy, it's gotta be A. Vulnerabilities are the entry points for threats, so understanding how they can be exploited is the foundation for threat identification. The other choices are important, but not as directly relevant to the core task.
DPM policy creation? I remember we covered this in class, but the details are a bit fuzzy. I'll try to recall the main steps and make an educated guess.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Rodney
5 months agoFelicidad
5 months agoMilly
5 months agoRodolfo
5 months agoBrett
5 months agoDesiree
6 months agoJame
6 months agoAntonio
6 months agoYuriko
6 months agoGladis
6 months agoHelaine
6 months ago