Multiple Choice
Vulnerabilities are
A) Safeguards used to minimize the impact of threats
B) Capabilities, intentions and attack methods of adversaries to cause harm to assets
C) Resource or information that is to be protected
D) Weaknesses in an information system that can lead to a compromise of an asset
Correct Answer:

Verified
Correct Answer:
Verified
Q11: Threats are<br>A) Safeguards used to minimize the
Q12: Controls are<br>A) Safeguards used to minimize the
Q13: Rootkits are<br>A) Software used to hide the
Q14: Zero-day exploits are<br>A) Software used to hide
Q15: As reported in the chapter, recent trends
Q17: A lack of input validation vulnerability refers
Q18: Phishing refers to<br>A) Programs that propagate through
Q19: A SQL injection vulnerability is an example
Q20: Zeus and Spyeye are examples of<br>A) Viruses<br>B)
Q21: The CVE list is<br>A) A list of