Matching
Match the following SWOT terms to their meanings:
Premises:
Denial of Service
Opportunities
Spoofing
Weaknesses
Repudiation
Tampering
Threat Tree
Threats
Strengths
Responses:
situations that endanger the organization‘s security
ability of an organization to ensure the security and recoverability of their cryptographic keys
tool that is useful in setting up the test for threats
didn’t work as well as it should have
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
things that were done particularly well
can be used to make better use of resources
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
to interfere or meddle with in order to damage or corrupt
Correct Answer:
Premises:
Responses:
Denial of Service
Opportunities
Spoofing
Weaknesses
Repudiation
Tampering
Threat Tree
Threats
Strengths
Premises:
Denial of Service
Opportunities
Spoofing
Weaknesses
Repudiation
Tampering
Threat Tree
Threats
Strengths
Responses:
Related Questions
Q12: Which threat analysis involves the use of
Q13: Ideally,every threat should be addressed _ as
Q14: It is often beneficial to the team
Q15: Which of the SWOT terms point out
Q16: What can be learned from a failed
Q17: What usually follows the fact-finding meetings which
Q18: Which of the following is a diagram
Q19: It is important,before the team has too
Q20: Once you discover a threat at the
Q21: _ in some operating systems are well
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents