While identifying vulnerable assets is an important step, it typically comes after evaluating the likelihood of attack. Once the likelihood is determined, organizations can focus on identifying the assets or systems that are potentially affected by the zero-day vulnerability.
Ans: C
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Deeplaxmi
Highly Voted 2 years, 1 month agoscriptkiddie
Most Recent 4 months agoscriptkiddie
4 months ago5b56aae
7 months, 1 week agoPC2323
1 year, 2 months agoTTH1019
1 year, 5 months ago