A security researcher has completed a vulnerability assessment and has documented a list of vulnerabilities. When performing a risk assessment, what should these documented items be translated into?

IT Questions BankCategory: IoT SecurityA security researcher has completed a vulnerability assessment and has documented a list of vulnerabilities. When performing a risk assessment, what should these documented items be translated into?

A security researcher has completed a vulnerability assessment and has documented a list of vulnerabilities. When performing a risk assessment, what should these documented items be translated into?

  • threats
  • risks
  • assets
  • vulnerabilities

Explanation: In a risk assessment, known vulnerabilities are translated into risks so that they may be prioritized and addressed accordingly.

More Questions: IoT Sec 1.1 Fundamentals: IoT Security Final Exam Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x