75.1k views
5 votes
A(n) ___lists out and rates the vulnerabilities of an organization.

a) incident response plan
b) social engineering plan
c) public key encryption scheme
d) risk matrix

User Sukumar
by
8.9k points

1 Answer

4 votes

Final answer:

A document that lists and rates organization vulnerabilities is called a risk matrix, part of the risk management process. This is distinct from an incident response plan, social engineering plan, or public key encryption scheme. The correct answer is option c) public key encryption scheme

Step-by-step explanation:

A document that lists out and rates the vulnerabilities of an organization is known as a risk matrix. The risk matrix is utilized to prioritize the potential risks based on the likelihood of them occurring and the impact they would have on the organization. It is an essential component of the risk management process and assists in the strategic planning and decision-making to protect an organization's assets.

An incident response plan is something different and focuses on the actions to take when a security incident occurs. Social engineering plan isn't a standard term used in information security, but it might refer to strategies used to defend against social engineering attacks. Public key encryption scheme is a method used in cryptography to secure communications and would not be used to assess risk.

As reflected in Figure 20.1, there are different approaches to managing risk, with Plan A typically denoting a more reactive approach, whereas Plan B is a more proactive approach to mitigate threats. The importance of correctly assessing risk and choosing appropriate plans to address them can't be overstated as the consequences of a real threat manifesting without adequate preparation could be devastating.

User Mellon
by
7.6k points