Components of a cyber security program Quiz

1. What is the primary purpose of a Cybersecurity Assessment Tool (CAT)?

2. Which category examines the number of connections from third parties and ISPs?

3. What is a common method used by cybercriminals to gain access to an organization?

4. What does a vulnerability assessment scan for?

5. What is the most common method criminals use to gain unauthorized access to organizations?