Multiple Choice
What is defined as specific avenues that threat agents can exploit to attack an information asset?
A) Liabilities
B) Defenses
C) Vulnerabilities
D) Weaknesses
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q48: Classification categories must be mutually exclusive and
Q49: Remains even after current control has been
Q50: For the purposes of relative risk assessment
Q51: An evaluation of the threats to information
Q52: Labels that must be comprehensive and mutually
Q54: Which of the following is a network
Q55: The likelihood of the occurrence of a
Q56: What should you be armed with to
Q57: An approach to combining risk identification,risk assessment,and
Q58: Some threats can manifest in multiple ways,yielding