Multiple Choice
The NVD database
A) Describes likely impacts and measures to remove vulnerabilities
B) A list of all known viruses
C) A list of all known information security firms
D) An inventory of known software vulnerabilities
Correct Answer:

Verified
Correct Answer:
Verified
Q3: Vulnerabilities in IT systems can be eliminated
Q4: Malware refers to<br>A) Programs that propagate through
Q5: Denial of service refers to<br>A) Programs that
Q6: Zombies are<br>A) Software used to hide the
Q7: Assets are<br>A) Resources or information that is
Q9: A cross-site scripting vulnerability can occur when<br>A)
Q10: Physical controls<br>A) Use non-technical methods of preventing
Q11: Threats are<br>A) Safeguards used to minimize the
Q12: Controls are<br>A) Safeguards used to minimize the
Q13: Rootkits are<br>A) Software used to hide the