In information security, ____ exists when a vulnerability known to an attacker is present.
A) threat
B) loss
C) risk
D) exposure
Correct Answer:
Verified
Q5: Which individual interferes with or disrupts systems
Q6: Which e-mail attack occurs when an attacker
Q7: Which attack is used when a copy
Q8: An unlocked door is an example of
Q9: The McCumber Cube provides a _ description
Q11: One of the basic tenets of security
Q12: Which resource is a physical asset?
A) Web
Q13: Which term identifies a single instance of
Q14: Which term describes a subject or object's
Q15: The CIA triad is based on three
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents