1. What is NOT a classification of data?
risk
proprietary
private
public
2- The main benefit of a vulnerability assessment is that hackers cannot perform the same steps as people performing the assessment.
True
False
3- When should you perform a risk assessment?
when mitigating a threat
when eliminating a threat
periodically
continuously
4- An exploit assessment is also known as a(n) ___________.
exploit list
penetration test
vulnerability assessment
threat survey
5- What is a whitelist?
a list of e-mail addresses or domains automatically marked as spam
a list of e-mail addresses targeted in a phishing scam
a list of approved e-mail addresses or domains
a list of rejected e-mail domains