Certified Information Systems Security Professional – CISSP – Question313

Which of the following needs to be taken into account when assessing vulnerability?

A.
Risk identification and validation
B. Threat mapping
C. Risk acceptance criteria
D. Safeguard selection