Which four task items need to be performed for an effective risk assessment and to evaluate network posture? (Choose four)
A. Scanning
B. Mitigation
C. Baselining
D. Profiling
E. Notification
F. Validation
G. Discovery
H. Escalation
Which four task items need to be performed for an effective risk assessment and to evaluate network posture? (Choose four)
A. Scanning
B. Mitigation
C. Baselining
D. Profiling
E. Notification
F. Validation
G. Discovery
H. Escalation
https://www.techrepublic.com/blog/it-security/take-this-four-phase-approach-to-a-network-risk-assessment-92188/