An IS auditor is reviewing an organization’s network vulnerability scan results.
Which of the following processes would the scan results MOST likely feed into?
A . Firewall maintenance
B . Patch management
C . Incident response
D . Traffic management
Answer: A
Latest CISA Dumps Valid Version with 2694 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund