CISM Certified Information Security Manager – Question0383

Which of the following processes can be used to remediate identified technical vulnerabilities?

A.
Running baseline configurations
B. Conducting a risk assessment
C. Performing a business impact analysis (BIA)
D. Running automated scanners

Correct Answer: B