Which of the following processes BEST enables a risk practitioner to gather evidence about the threat environment for further analysis? A. Risk assessment B. Threat modeling C. Vulnerability scanning D. Threat intelligence Suggested Answer: B This question is in CRISC exam For getting Risk and Information Systems Control Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer