Question: Match each term with the correct statement below. a . Threat evaluation f . Risk mitigation b . Vulnerability scan g . Vulnerability appraisal c

Match each term with the correct statement below.
a. Threat evaluation
f. Risk mitigation
b. Vulnerability scan
g. Vulnerability appraisal
c. Risk assessment
h. Peneration testing
d. Vulnerability assessment
i. Asset identification
e. Hardening
59. A systematic and methodical evahuation of the exposure of assets to attackers, forces of nature, or any other entity that is potentially harmful
60. Identify what needs to be protected
61. Identifying what the pressures are against a company
62. Identifying how susceptible the curret protection is
63. Identify what damages could result from the treats
64. Identify what to do about threats
65. An automated software search through a yztom for any lnown security weaknesses
66. Designed to actually exploit any wealnesses in systems that are vulnerable
67. Eliminating as many security risls as possible and make the system more secure
March each term with the correct statement below.
a. Storeroom lodks
f. Deadbolt locks
b. Standard keyed entry looks
g. Keyed entry locks
c. Privacy lods
h. Classroom locks
d. Store entry double cylinder lods
i. Passage lodks
e. Patio locks
68. Use a key to open the lock from the outside
69. Lock the door but have access to unlock from the outside via a small hole
70. Lock the door from the inside but cannot be unlocked from the outside
71. Latch a door closed yet do not lock; typically used on hall and closet doors
72. Most common type of door lock for keeping out intruders, but its security is minimal
73. Extends a solid metal bar into the door frame for eatra security
74. The outside is always locked, entry is by key only, and the inside lever is always unlocked
75. The outside can be lodked or unlodked, and the inside lever is always unlocked.
76. Include a keyed cylinder in both the outside and inside knobs so that a key in either knob looks or unlocks both at the same time
Match each term with the correct statement below.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!