Using the PTES standard, there are ___ stages, and vulnerability analysis occurs at stage ___.
Which of the following is an international standard for implementing and maintaining
information security systems?
A. ISO 27001
B. NIST 800-34
C. NIST 800-30
D. ISO 27002
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here