Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Information Technology for Management
Quiz 5: Cybersecurity and Risk Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 121
Short Answer
One source of cybersecurity threats today are _____________,who hack for their own causes and attempt to gain media attention.
Question 122
Short Answer
_____________ is the elapsed time between when vulnerability in a software app or system is discovered and when it's exploited.
Question 123
Short Answer
Malware infected computers can be organized into networks called ________.
Question 124
Short Answer
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is referred to as a(n)___________ attack.
Question 125
Short Answer
When sending sensitive email,James uses a program that transforms data into scrambled code to protect it from being understood by unauthorized users.James is using ___________ to protect his email communications.