CRISC Certified in Risk and Information Systems Control – Question571

Which of the following is the BEST way to validate the results of a vulnerability assessment?

A.
Perform a penetration test
B. Perform a root cause analysis
C. Conduct a threat analysis
D. Review security logs

Correct Answer: A