CySA+ CS0-001 – Q. 190

0
14

During which of the following NIST risk management framework steps would an information system security engineer identify inherited security controls and tailor those controls to the system?

A. Categorize
B. Select
C. Implement
D. Access

LEAVE A REPLY

Please enter your comment!
Please enter your name here