1. What is NOT a classification of data? risk proprietary private public 2- The
ID: 357815 • Letter: 1
Question
1. What is NOT a classification of data?
risk
proprietary
private
public
2- The main benefit of a vulnerability assessment is that hackers cannot perform the same steps as people performing the assessment.
True
False
3- When should you perform a risk assessment?
when mitigating a threat
when eliminating a threat
periodically
continuously
4- An exploit assessment is also known as a(n) ___________.
exploit list
penetration test
vulnerability assessment
threat survey
5- What is a whitelist?
a list of e-mail addresses or domains automatically marked as spam
a list of e-mail addresses targeted in a phishing scam
a list of approved e-mail addresses or domains
a list of rejected e-mail domains
when mitigating a threat
when eliminating a threat
periodically
continuously
4- An exploit assessment is also known as a(n) ___________.
exploit list
penetration test
vulnerability assessment
threat survey
5- What is a whitelist?
a list of e-mail addresses or domains automatically marked as spam
a list of e-mail addresses targeted in a phishing scam
a list of approved e-mail addresses or domains
a list of rejected e-mail domains
Explanation / Answer
Hence the answer is (a) Risk
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.