ISRM W 6 D

profileudontneedmyname

 

Although it is impossible to eliminate all business risks, risk assessments are used to identify and quantify risks.  

1. Define an "exploit assessment" in your own words. Please provide 1 example result of an exploit assessment.

2. Define a "vulnerability assessment" in your own words.  Please provide 1 example result of a vulnerability assessment.

3. Discuss the difference between an exploit assessment and a vulnerability assessment. Which assessment is more valuable?  Should they both be performed?

    • 5 years ago
    • 5
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      order_52081_ISRMW6D.doc