Although it is impossible to eliminate all business risks, risk assessments are used to identify and quantify risks.1. Define an “exploit assessment” in your own words. Please provide 1 example result of an exploit assessment.2. Define a “vulnerability assessment” in your own words. Please provide 1 example result of a vulnerability assessment.3. Discuss the difference between an exploit assessment and a vulnerability assessment. Which assessment is more valuable? Should they both be performed?