Multiple Choice
____ are specific avenues that threat agents can exploit to attack an information asset.
A) threats
B) exploits
C) vulnerabilities
D) attacks
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q4: Classification categories must be _ and mutually
Q19: The last stage in the risk identification
Q20: The data classification scheme for an information
Q21: During risk identification,managers identify the organization's information
Q22: Deliberate software attacks include worms,denial of service,macros,and
Q23: A community of management and users that
Q26: The relative value of an information asset
Q27: Classification categories must be _ (all inventoried
Q28: In a TVA worksheet,along one asset lies
Q29: Knowing the enemy means that the threats