Question 50
Main Page
Your team discovers a recurring phishing campaign exploiting a known vulnerability. What risk assessment step does this fall under?
A. Risk treatment
B. Risk identification
C. Asset inventory
D. Policy definition
Answer: B. Risk identification
Identification involves uncovering threats, vulnerabilities, and the assets they impact. This recurring campaign clearly qualifies as a threat event.