In what order are the steps in the vulnerability management life cycle conducted?

IT Questions BankCategory: CCNA CyberOpsIn what order are the steps in the vulnerability management life cycle conducted?
In what order are the steps in the vulnerability management life cycle conducted? 1IT Administrator Staff asked 10 months ago

In what order are the steps in the vulnerability management life cycle conducted?

  • discover, assess, prioritize assets, report, remediate, verify
  • discover, prioritize assets, assess, remediate, report, verify
  • discover, prioritize assets, assess, remediate, verify, report
  • discover, prioritize assets, assess, report, remediate, verify

Explanation: There are six steps in the vulnerability management life cycle:
Discover
Prioritize assets
Assess
Report
Remediate
Verify

More Questions: Modules 21 – 23: Cryptography and Endpoint Protection Group Exam


Related Articles