ECCouncil 312-76 Question Answer
Jon wanted to conduct a vulnerability assessment for his startup in order to safeguard it from any disaster in the future. The steps in vulnerability assessment are given below:
a) Assess the potential impact of the threat on the organization
b) Estimate the probability of occurrence of each threat
c) Assess the internal and external resources available to mitigate the identified threats
d) List the threats that may occur
In which order should Jon implement these steps?