2.0
Threats, Vulnerabilities, and Mitigations
Identify and analyze threats, vulnerabilities, and mitigation strategies
22% of ExamCompare and contrast common threat actors and motivations
Medium
Explain common threat vectors and attack surfaces
Medium
Explain various types of vulnerabilities
Medium
Analyze indicators of malicious activity
Hard
Explain the purpose of mitigation techniques used to secure the enterprise
Hard