Multiple Choice
Match the following terms to the appropriate definitions.
-The code that can be executed by unauthorized users in a software program
A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q17: Describe a penetration testing report.
Q21: What is another term used for a
Q28: List two types of hardening techniques.
Q31: The goal of what type of threat
Q34: Match the following terms to the appropriate
Q35: An administrator running a port scan wants
Q38: What security goal do the following common
Q39: A port in what state below implies
Q40: In a _ test, the tester has
Q41: Match the following terms to the appropriate