Question: Match each term with the correct statement below. a . Threat evaluation f . Risk mitigation b . Vulnerability scan g . Vulnerability appraisal c
Match each term with the correct statement below.
a Threat evaluation
f Risk mitigation
b Vulnerability scan
g Vulnerability appraisal
c Risk assessment
h Peneration testing
d Vulnerability assessment
i Asset identification
e Hardening
A systematic and methodical evahuation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
Identify what needs to be protected
Identifying what the pressures are against a company
Identifying how susceptible the curret protection is
Identify what damages could result from the treats
Identify what to do about threats
An automated software search through a yztom for any lnown security weaknesses
Designed to actually exploit any wealnesses in systems that are vulnerable
Eliminating as many security risls as possible and make the system more secure
March each term with the correct statement below.
a Storeroom lodks
f Deadbolt locks
b Standard keyed entry looks
g Keyed entry locks
c Privacy lods
h Classroom locks
d Store entry double cylinder lods
i Passage lodks
e Patio locks
Use a key to open the lock from the outside
Lock the door but have access to unlock from the outside via a small hole
Lock the door from the inside but cannot be unlocked from the outside
Latch a door closed yet do not lock; typically used on hall and closet doors
Most common type of door lock for keeping out intruders, but its security is minimal
Extends a solid metal bar into the door frame for eatra security
The outside is always locked, entry is by key only, and the inside lever is always unlocked
The outside can be lodked or unlodked, and the inside lever is always unlocked.
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob looks or unlocks both at the same time
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
