• Home
  • Blog
  • 10 pointsQUESTION 2Propagation vectors may leverage closed network connection,

10 pointsQUESTION 2Propagation vectors may leverage closed network connection,

0 comments

10 points  

QUESTION 2

  1. Propagation vectors may leverage closed network connection,

file shares or software vulnerability

 True False

10 points  

QUESTION 3

  1. What is the definition of a threat?
  2. Attempt to cause damage to our comprise information of supporting systems
  3. Threat instance
  4. Object, person, other entity posing potential risk of loss to an asset
  5. Organizational resources being protected

10 points  

QUESTION 4

  1. What is the definition of exploit?
  2. Prevent attack
  3. Malicious code, malicious software, malware
  4. Flow or weakness in system security procedures design, implementation, internal controls.
  5. Flow or weakness in system security procedure, design, implementation, internal controls.

10 points  

QUESTION 5

  1. Well-meaning people send random e-mail warning of 

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}