Solved

Match Each Term with the Correct Statement Below

Question 33

Matching

Match each term with the correct statement below.

Premises:
An automated software search through a system for any known security weaknesses
Identify what damages could result from the threats
Designed to actually exploit any weaknesses in systems that are vulnerable
Identify what needs to be protected
Eliminating as many security risks as possible and make the system more secure
Identify what to do about threats
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identifying what the pressures are against a company
Identifying how susceptible the current protection is
Responses:
Asset identification
Vulnerability scan
Vulnerability assessment
Vulnerability appraisal
Threat evaluation
Risk assessment
Risk mitigation
Hardening
Penetration testing

Correct Answer:

An automated software search through a system for any known security weaknesses
Identify what damages could result from the threats
Designed to actually exploit any weaknesses in systems that are vulnerable
Identify what needs to be protected
Eliminating as many security risks as possible and make the system more secure
Identify what to do about threats
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identifying what the pressures are against a company
Identifying how susceptible the current protection is
Related Questions