Threats are
A) Safeguards used to minimize the impact of threats
B) Capabilities, intentions and attack methods of adversaries to cause harm to assets
C) Resource or information that is to be protected
D) Weaknesses in an information system that can lead to a compromise of an asset
Correct Answer:
Verified
Q11: A cross-site scripting vulnerability can occur when
A)
Q12: Vulnerabilities in IT systems can be eliminated
Q13: A buffer overflow vulnerability refers to a
Q14: The CVE list is
A) A list of
Q15: Relative to physical security, information security is
Q17: As reported in the chapter, recent trends
Q18: Denial of service refers to
A) Programs that
Q19: Malware refers to
A) Programs that propagate through
Q20: A lack of input validation vulnerability refers
Q21: Zombies are
A) Software used to hide the
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents