Podcast
Questions and Answers
Which one of the following best defines a computer security risk?
Which one of the following best defines a computer security risk?
What is the purpose or end goal of an incident?
What is the purpose or end goal of an incident?
What is a step taken by a user or process in order to achieve a result?
What is a step taken by a user or process in order to achieve a result?
What does a vulnerability refer to in computer security?
What does a vulnerability refer to in computer security?
Signup and view all the answers
What is an unauthorized consequence of an event called?
What is an unauthorized consequence of an event called?
Signup and view all the answers
Which one of the following is a means of exploiting a computer or network vulnerability?
Which one of the following is a means of exploiting a computer or network vulnerability?
Signup and view all the answers
What is an individual who attempts to take a series of steps to achieve an unauthorized result called?
What is an individual who attempts to take a series of steps to achieve an unauthorized result called?
Signup and view all the answers
What is a weakness in a system allowing unauthorized action called?
What is a weakness in a system allowing unauthorized action called?
Signup and view all the answers
What is an action directed at a target that is intended to result in a change of state or status of the target called?
What is an action directed at a target that is intended to result in a change of state or status of the target called?
Signup and view all the answers
What is the purpose or end goal of an incident called?
What is the purpose or end goal of an incident called?
Signup and view all the answers