Which of the following is true regarding internal vulnerability scans?
Question No 2
An entity wants to use the Customized Approach. They are unsure how to complete the Controls Matrix or TR A. During the assessment, you spend time completing the Controls Matrix and the TRA, while also ensuring that the customized control is implemented securely. Which of the following statements is true?
Question No 3
Security policies and operational procedures should be?
Question No 4
Which of the following is true regarding compensating controls?
Question No 5
Where an entity under assessment is using the customized approach, which of the following steps is
the responsibility of the assessor?