10 points QUESTION 2
- Propagation vectors may leverage closed network connection,
file shares or software vulnerability True False
Don't use plagiarized sources. Get Your Custom Essay on
10 points QUESTION 3
- What is the definition of a threat?
- Attempt to cause damage to our comprise information of supporting systems
- Threat instance
- Object, person, other entity posing potential risk of loss to an asset
- Organizational resources being protected
10 points QUESTION 4
- What is the definition of exploit?
- Prevent attack
- Malicious code, malicious software, malware
- Flow or weakness in system security procedures design, implementation, internal controls.
- Flow or weakness in system security procedure, design, implementation, internal controls.
10 points QUESTION 5
- Well-meaning people send random e-mail warning of