Multiple Choice
Relative to physical security, information security is challenging because
A) Assets are largely invisible
B) Most assets are easily duplicated
C) Both the above
D) None of the above
Correct Answer:

Verified
Correct Answer:
Verified
Q1: A buffer overflow vulnerability refers to a
Q3: Vulnerabilities in IT systems can be eliminated
Q4: Malware refers to<br>A) Programs that propagate through
Q5: Denial of service refers to<br>A) Programs that
Q6: Zombies are<br>A) Software used to hide the
Q7: Assets are<br>A) Resources or information that is
Q8: The NVD database<br>A) Describes likely impacts and
Q9: A cross-site scripting vulnerability can occur when<br>A)
Q10: Physical controls<br>A) Use non-technical methods of preventing
Q11: Threats are<br>A) Safeguards used to minimize the