A security researcher has completed a vulnerability assessment and has documented a list of vulnerabilities. When performing a risk assessment, what should these documented items be translated into?
- threats
- risks
- assets
- vulnerabilities
Explanation: In a risk assessment, known vulnerabilities are translated into risks so that they may be prioritized and addressed accordingly.
Exam with this question: IoT Sec 1.1 Fundamentals: IoT Security Final Exam Answers
Please login or Register to submit your answer