Given below are different steps involved in the vulnerability-management life cycle. 1) Remediation 2) Identify assets and create a baseline 3) Verification 4) Monitor 5) Vulnerability scan 6) Risk assessment Identify the correct sequence of steps involved in vulnerability management. A. 2 → 5 → 6 → 1 → 3 → 4 B. 2 → 4 → 5 → 3 → 6 → 1 C. 2 → 1 → 5 → 6 → 4 → 3 D. 1 → 2 → 3 → 4 → 5 → 6 Suggested Answer: A Community Answer: A This question is in 312-50V12 EC-Council Certified Ethical Hacker v12 Exam For getting EC-Council Certified Ethical Hacker (CEH) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer