Although it is impossible to eliminate all business risks, risk assessments are used to identify and quantify risks.
1. Define an “exploit assessment” in your own words. Please provide 1 example result of an exploit assessment.
2. Define a “vulnerability assessment” in your own words. Please provide 1 example result of a vulnerability assessment.
3. Discuss the difference between an exploit assessment and a vulnerability assessment. Which assessment is more valuable? Should they both be performed?