Matching
Match each term with the correct statement below.
Premises:
An automated software search through a system for any known security weaknesses
Identify what damages could result from the threats
Designed to actually exploit any weaknesses in systems that are vulnerable
Identify what needs to be protected
Eliminating as many security risks as possible and make the system more secure
Identify what to do about threats
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identifying what the pressures are against a company
Identifying how susceptible the current protection is
Responses:
Asset identification
Vulnerability scan
Vulnerability assessment
Vulnerability appraisal
Threat evaluation
Risk assessment
Risk mitigation
Hardening
Penetration testing
Correct Answer:
Premises:
Responses:
An automated software search through a system for any known security weaknesses
Identify what damages could result from the threats
Designed to actually exploit any weaknesses in systems that are vulnerable
Identify what needs to be protected
Eliminating as many security risks as possible and make the system more secure
Identify what to do about threats
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identifying what the pressures are against a company
Identifying how susceptible the current protection is
Premises:
An automated software search through a system for any known security weaknesses
Identify what damages could result from the threats
Designed to actually exploit any weaknesses in systems that are vulnerable
Identify what needs to be protected
Eliminating as many security risks as possible and make the system more secure
Identify what to do about threats
A systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identifying what the pressures are against a company
Identifying how susceptible the current protection is
Responses:
Related Questions
Q17: Describe a penetration testing report.
Q18: The first step in a vulnerability assessment
Q28: _ for organizations are intended to identify
Q29: A _ tester has an in-depth knowledge
Q31: _ is a means by which an
Q32: The end product of a penetration test
Q34: A(n) _ scan uses various techniques to
Q35: A(n) _ examines the current security in
Q36: A(n) _ indicates that no process is
Q37: The _ for software is the code