Which of the following is a weakness of an asset or group of assets that can be exploited by one or more threats?
A) Threat
B) Vulnerability
C) Attack vector
D) Exploitation
Correct Answer:
Verified
Q69: Risk appetite directly affects what part of
Q70: Which of the following functions MUST your
Q71: Information security policies should be reviewed:
A) by
Q72: When choosing a risk mitigation method what
Q73: When creating a vulnerability scan schedule, who
Q75: Which of the following provides an audit
Q76: An organization information security policy serves to
A)
Q77: Payment Card Industry (PCI) compliance requirements are
Q78: The Information Security Management program MUST protect:
A)
Q79: When deploying an Intrusion Prevention System (IPS)
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents