Multiple Choice
In the context of information security, worms are
A) Activities performed by agents to compromise assets
B) Malicious software that uses operating system or application vulnerabilities for propagation
C) Software that performs simple tasks automatically and repetitively, usually at the direction of another software
D) Malicious content entered by an end user on a web-based system
Correct Answer:

Verified
Correct Answer:
Verified
Q10: Natural causes include all of the following
Q11: Unapproved software can be a threat action
Q12: Threat models are<br>A) Capabilities, intentions and attack
Q13: Partner threat agents include<br>A) Activist groups and
Q14: The 419 Nigerian scam is an example
Q16: Phishing is<br>A) An activity performed by agents
Q17: The goal of agents running a 419
Q18: Top management can be a threat agent
Q19: Threat agents are<br>A) Capabilities, intentions and attack
Q20: Most attacks on organizations originate from<br>A) Internal