exam questions

Exam 312-50 All Questions

View all questions & answers for the 312-50 exam

Exam 312-50 topic 2 question 7 discussion

Actual exam question from ECCouncil's 312-50
Question #: 7
Topic #: 2
[All 312-50 Questions]

Which of the following lists are valid data-gathering activities associated with a risk assessment?

  • A. Threat identification, vulnerability identification, control analysis
  • B. Threat identification, response identification, mitigation identification
  • C. Attack profile, defense profile, loss profile
  • D. System profile, vulnerability identification, security determination
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
dtwostar
7 months, 2 weeks ago
Selected Answer: A
RISK = Threats x Vulnerabilities x Impact The impact of an event on an information asset is the product of vulnerability in the asset and the asset’s value to its stakeholders.
upvoted 1 times
...
Sbowo
2 years, 9 months ago
I think its C because the question is risk assessment not risk identification, so C is the only option without identification term inside
upvoted 1 times
...
Luukman
3 years, 5 months ago
Can anybody tell me why B is wrong?
upvoted 1 times
salei
1 year, 10 months ago
I think identify what are the mitigation (tasks, tools, methods etc.) is beyond Risk Assessment
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago