A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy is a(n) __________.
A) countermeasure
B) vulnerability
C) adversary
D) risk
Correct Answer:
Verified
Q11: The "A" in the CIA triad stands
Q12: Contingency planning is a functional area that
Q13: Threats are attacks carried out.
Q14: In the context of security our concern
Q15: Availability assures that systems works promptly and
Q17: A _ level breach of security could
Q18: Data integrity assures that information and programs
Q19: Security mechanisms typically do not involve more
Q20: A loss of _ is the unauthorized
Q21: A _ is any action that compromises
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents