Problem
Although it is impossible to eliminate all business risks, risk assessments are used to identify and quantify risks.
1. Define an "exploit assessment" in your own words. Provide 1 example result of an exploit assessment.
2. Define a "vulnerability assessment" in your own words. Provide 1 example result of a vulnerability assessment.
3. Discuss the difference between an exploit assessment and a vulnerability assessment. Which assessment is more valuable? Should they both be performed?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.