What is the first step in a risk assessment?
Identifying assets helps determine what needs protection before analyzing threats and vulnerabilities.
What is a threat in cybersecurity?
A threat is any circumstance or event with the potential to cause harm to systems or data.
Which of the following is an example of a vulnerability?
A vulnerability is a weakness that can be exploited by a threat to cause harm.
What is the purpose of a risk matrix?
A risk matrix helps evaluate and prioritize risks based on their likelihood and impact.
How is risk calculated in cybersecurity?
Risk is typically calculated as a function of threat likelihood and impact severity.
Why is it important to classify assets?
Classifying assets helps prioritize protection based on sensitivity and importance.
Loading Questions...
What is a common risk mitigation strategy?
Risk mitigation involves reducing the likelihood or impact of a threat through controls or policies.
What is a zero-day vulnerability?
A zero-day vulnerability is a software flaw unknown to the vendor, with no fix available.
What is risk acceptance?
Risk acceptance means acknowledging a risk and deciding not to take any action, often when the cost of mitigation exceeds the potential impact.