FOOD TECHNOLOGY

FOOD QUALITY AND SAFETY

QUALITY CONTROL IN FOOD PROCESSING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following are essential criteria when doing vulnerability assessment?I. Degree of damage to the company’s brandII. Duration to recover from the damageIII. Attacker ability to contaminateIV. Potential public health impactV. Degree of physical accessibility
A
I and II
B
IV and V
C
II and IV
D
II, III, and V
E
III, IV, and V
Explanation: 

Detailed explanation-1: -The assessment framework involves three dimensions: engagement, intent and capability, which are considered separately.

Detailed explanation-2: -Vulnerability assessment: Security scanning process. The security scanning process consists of four steps: testing, analysis, assessment and remediation.

Detailed explanation-3: -The four continuous stages of identification, prioritization, remediation, and reporting are essential for an effective vulnerability management process. A vulnerability is a flaw or weakness in a system that, if exploited, would allow a user to gain unauthorized access to conduct an attack.

Detailed explanation-4: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

There is 1 question to complete.