Which of the following is NOT a goal that needs to be identified before performing a vulnerability assessment?

A. the cost of the assessment
B. the relative value of the information that could be discovered through a compromise
C. the specific threats that are applicable to the component being assessed
D. Available mitigation strategies that could be deployed


A
Explanation: Before an assessment process is developed, the following goals of the assessment need to be identified:
• The relative value of the information that could be discovered through the compromise of the components under assessment. This helps to identify the amount of resources that should be devoted to the issue.
• The specific threats that are applicable to the component. For example, a web application would not be exposed to the same issues that a firewall might be due to the differences in their operation and position in the network.
• The available mitigation strategies that could be deployed to address issues that might be found. Identifying common strategies may suggest issue that weren't anticipated initially. For example, if you were doing a vulnerability test of your standard network operating system image, you should anticipate issues you might find and identify what technique you will use to address each.

Computer Science & Information Technology

You might also like to view...

Why is byte stuffing needed?

What will be an ideal response?

Computer Science & Information Technology

Briefly explain why you should document after you have solved a problem.

What will be an ideal response?

Computer Science & Information Technology

You cannot apply a built-in table style to only a portion of a PowerPoint table

Indicate whether the statement is true or false

Computer Science & Information Technology

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

a. The computer has been assigned a routed public IP address. b. The network card has been erroneously assigned a loopback address. c. The computer is configured to use DHCP, but was unable to lease an address. d. The network card is set up for multicast communication.

Computer Science & Information Technology