John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________. A. Mitigation, Security policies B. Verification, Security Policies C. Vulnerability scanning, Risk Analysis D. Risk analysis, Risk matrix  Suggested Answer: B Community Answer: B This question is in 312-38 Certified Network Defender Exam For getting Certified Network Defender (CND) Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer