Matching
Match each term with the correct statement below.
Premises:
An automated software search through a system for any known security weaknesses
Identify what damages could result from the threats
Designed to actually exploit any weaknesses in systems that are vulnerable
Identify what needs to be protected
Eliminating as many security risks as possible and make the system more secure
Identify what to do about threats
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identifying what the pressures are against a company
Identifying how susceptible the current protection is
Responses:
Asset identification
Vulnerability scan
Vulnerability assessment
Vulnerability appraisal
Threat evaluation
Risk assessment
Risk mitigation
Hardening
Penetration testing
Correct Answer:
Premises:
Responses:
An automated software search through a system for any known security weaknesses
Identify what damages could result from the threats
Designed to actually exploit any weaknesses in systems that are vulnerable
Identify what needs to be protected
Eliminating as many security risks as possible and make the system more secure
Identify what to do about threats
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identifying what the pressures are against a company
Identifying how susceptible the current protection is
Premises:
An automated software search through a system for any known security weaknesses
Identify what damages could result from the threats
Designed to actually exploit any weaknesses in systems that are vulnerable
Identify what needs to be protected
Eliminating as many security risks as possible and make the system more secure
Identify what to do about threats
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identifying what the pressures are against a company
Identifying how susceptible the current protection is
Responses:
Related Questions
Q23: When using a black box test, many
Q32: A _ is a network set up
Q33: Released in 1995, one of the first
Q35: A security weakness is known as a(n)
Q38: A(n) _ examines the current security in
Q43: List and describe two common uses for
Q44: List and describe the three categories that
Q45: List two types of hardening techniques.
Q45: Discuss the purpose of OVAL.
Q49: When a security hardware device fails or
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents