Multiple Choice
Unapproved software can be a threat action because
A) The software may be exploited by hackers
B) Organizations do not like employees or users to pay for software
C) The software may take up hard disk space
D) The software may have been developed by a competitor
Correct Answer:

Verified
Correct Answer:
Verified
Q6: Threats are<br>A) Capabilities, intentions and attack methods
Q7: Threat actions are<br>A) Activities performed by agents
Q8: OWASP is<br>A) An organization that is attempting
Q9: External threat agents include<br>A) Partners and suppliers<br>B)
Q10: Natural causes include all of the following
Q12: Threat models are<br>A) Capabilities, intentions and attack
Q13: Partner threat agents include<br>A) Activist groups and
Q14: The 419 Nigerian scam is an example
Q15: In the context of information security, worms
Q16: Phishing is<br>A) An activity performed by agents