Which of the following is the MOST effective method for discovering common technical vulnerabilities within the IT environment? A. Reviewing system administrator logs B. Auditing configuration templates C. Checking vendor product releases D. Performing system scans Suggested Answer: D This question is in 712-50 EC-Council Certified CISO (CCISO) Exam For getting EC-Council Certified CISO (CCISO) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exam.
Please login or Register to submit your answer