FOOD TECHNOLOGY

FOOD QUALITY AND SAFETY

QUALITY CONTROL IN FOOD PROCESSING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A vulnerability assessment must be conducted by ____
A
an employee of a regulatory agency
B
a vendor contracted specifically for this purpose
C
a new employee with a fresh perspective on the company’s process
D
a qualified individual
E
food defense auditor
Explanation: 

Detailed explanation-1: -Vulnerability assessments allow security teams to identify, analyze, categorize, report, and remediate security vulnerabilities in operating systems, business applications, endpoint devices, and browsers.

Detailed explanation-2: -Conduct a Vulnerability Assessment using the Three Elements The elements are criticality, which measures the potential health impact if a contaminant were added by volume of food at risk, representative contaminant, or contaminant specific analysis; accessibility to product; and, vulnerability.

Detailed explanation-3: -FDA’s final Intentional Adulteration (IA) rule is aimed at preventing intentional adulteration from acts intended to cause wide-scale harm to public health, including acts of terrorism targeting the food supply.

Detailed explanation-4: -Potential public health impact. Degree of physical access. Ability of an attacker to contaminate the product. 07-Jun-2019

There is 1 question to complete.