CompTIA Exam Questions

A cybersecurity analyst is completing an organization-s vulnerability report and wants it to reflect

A cybersecurity analyst is completing an organization-s vulnerability report and wants it to reflect assets accurately. Which of the following items should be in the report?

A. Processor utilization

B.

Virtual hosts

C. Organizational governance

D. Log disposition

E. Asset isolation

Explanation: