Which of the following NIST risk management framework steps would an information system security engineer identify inherited security controls and tailor those controls to the system?

During which of the following NIST risk management framework steps would an information system security engineer identify inherited security controls and tailor those controls to the system?
A. Categorize
B. Select
C. Implement
D. Access

CS0-002: CompTIA CySA+ Exam

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.