Briefly list the things which happen during the planning and preparation phase of the security assessment methodology.
What will be an ideal response?
During the planning and preparation phase of the security assessment methodology, the assessor defines a scope, gathers information about potential weak areas of the network, identifies potential attacks, classifies and prioritizes assets, specifies objectives and goals, and lists resources required.
You might also like to view...
The set of all characters used to write programs on a computer is called its ________.
Fill in the blank(s) with the appropriate word(s).
When indenting the first line of paragraph from the left margin, use a hanging indent
Indicate whether the statement is true or false
A volume functions like a separate disk
Indicate whether the statement is true or false
A(n) ____________________ is a style applied to an Activity or an entire application.
Fill in the blank(s) with the appropriate word(s).