Matching
Match each term with the correct statement below.
Premises:
the task of identifying and categorizing assets
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
a policy that defines the actions users may perform while accessing systems and networking equipment
taking advantage of a vulnerability
a type of action that has the potential to cause harm
the likelihood that a threat agent will exploit a vulnerability
a flaw or weakness that allows a threat agent to bypass security
a record of events
adjustments to a WLAN performed as part of routine maintenance
the storage area in which SNMP software agents store their data
Responses:
exploiting
risk
asset management
RF site tuning
event log
acceptable use policy
MIB
impact analysis
threat
vulnerability
Correct Answer:
Premises:
Responses:
the task of identifying and categorizing assets
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
a policy that defines the actions users may perform while accessing systems and networking equipment
taking advantage of a vulnerability
a type of action that has the potential to cause harm
the likelihood that a threat agent will exploit a vulnerability
a flaw or weakness that allows a threat agent to bypass security
a record of events
adjustments to a WLAN performed as part of routine maintenance
the storage area in which SNMP software agents store their data
Premises:
the task of identifying and categorizing assets
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
a policy that defines the actions users may perform while accessing systems and networking equipment
taking advantage of a vulnerability
a type of action that has the potential to cause harm
the likelihood that a threat agent will exploit a vulnerability
a flaw or weakness that allows a threat agent to bypass security
a record of events
adjustments to a WLAN performed as part of routine maintenance
the storage area in which SNMP software agents store their data
Responses:
Related Questions
Q26: What is RMON?
Q27: What is the first phase of the
Q28: Which of the following is NOT a
Q29: List three types of security policy.
Q30: What does an updated enterprise-level AP use
Q32: Describe social engineering.
Q33: What are frequently the weakest link in
Q34: Which of the following is NOT an
Q35: A _ assessment attempts to identify what
Q36: _ is a nonvolatile storage chip that