AMA University Answers
Login
Register
AMA OED
Courses
IT
IT-6205A
The goal of this step is to un...
The goal of this step is to understand what data could cause harm to your organization.
Identification of Critical Information
Correct
Analysis of Vulnerabilities
Analysis of Threat
Assessment of Risk
Similar IT-6205A questions
This acts as a deterrent against deliberate misconfigurations.
The process where individual pieces of data are grouped to form a bigger picture.
This step uses multiple sources, such as intelligence activities, law enforcement, and open source i...
The main advantage of security architecture is its standardization, which makes it affordable. Secur...
The security architecture must secure the entire IT infrastructure.
This means that only thoseauthorized to view information are allowed access to it.