Briefly list the things which happen during the planning and preparation phase of the security assessment methodology.

What will be an ideal response?


During the planning and preparation phase of the security assessment methodology, the assessor defines a scope, gathers information about potential weak areas of the network, identifies potential attacks, classifies and prioritizes assets, specifies objectives and goals, and lists resources required.

Computer Science & Information Technology

You might also like to view...

The set of all characters used to write programs on a computer is called its ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When indenting the first line of paragraph from the left margin, use a hanging indent

Indicate whether the statement is true or false

Computer Science & Information Technology

A volume functions like a separate disk

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____________________ is a style applied to an Activity or an entire application.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology