When creating a vulnerability scan schedule, who is the MOST critical person to communicate with in order to ensure impact of the scan is minimized?
Answer(s): A
Which of the following functions MUST your Information Security Governance program include for formal organizational reporting?
Risk appetite directly affects what part of a vulnerability management program?
Answer(s): B
When choosing a risk mitigation method what is the MOST important factor?
Post your Comments and Discuss EC-Council 512-50 exam with other Community members:
Teji Commented on December 15, 2024 Good Practice Questions before appearing to exams Anonymous
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 512-50 content, but please register or login to continue.