Threat and vulnerability analysis (D) addresses both existing vulnerabilities (e.g., unpatched systems) and potential threats (e.g., new attack techniques), aligning with the materials' focus on proactive risk identification. Historical data (A) and policy reviews (C) are reactive, while CSAs (B) validate controls rather than discover risks.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
46080f2
2 days, 21 hours ago