Tag: security

Questions Related to security

  1. Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset

  2. The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability

  3. Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset

  4. All of the above


Correct Option: C
  1. Threats

  2. Vulnerabilities

  3. Threats & Vulnerabilities

  4. All of the above


Correct Option: C
  1. port forwarding

  2. DUC client

  3. backtrack

  4. php scripts


Correct Option: B
  1. luring victims into attacks by using precisely targeted researched personal information schemes

  2. the practice of tricking a user into giving, or giving access to, sensitive information, thereby bypassing most or all protection; Use of propaganda by an authoritarian government to sway perceptions and attitudes of its own citizenry

  3. the act of someone who fishes as a diversion

  4. the act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a threat or request for information.


Correct Option: D