Multiple Choice
Match each statement with an item below.
-Something that looks like a desirable program or tool,but that is in fact a malicious entity.
A) Threat agent
B) Intellectual property
C) Hacker
D) Computer viruses
E) Trojan
F) Risk management
G) Likelihood
H) Residual risk
I) Standards
Correct Answer:

Verified
Correct Answer:
Verified
Q21: _ assigns a risk rating or score
Q22: Once intellectual property (IP)has been defined and
Q23: What is the difference between a disaster
Q24: Information has the characteristic of _ when
Q25: A _ attack seeks to deny legitimate
Q27: <i>Match each statement with an item below.</i><br>-Includes
Q28: A(n)_ is any clearly identified attack on
Q29: <i>Match each statement with an item below.</i><br>-A
Q30: Once the project team for information security
Q31: IRP focuses more on preparations completed before