Podcast
Questions and Answers
Which one of the following best defines a computer security risk?
Which one of the following best defines a computer security risk?
- A means of exploiting a computer or network vulnerability.
- An event or action that could cause a loss or damage to computer hardware, software, or processing capability. (correct)
- A weakness in a system allowing unauthorized action.
- An unauthorized consequence of an event.
What is the purpose or end goal of an incident?
What is the purpose or end goal of an incident?
- Target
- Attackers
- Action
- Objectives (correct)
What is a step taken by a user or process in order to achieve a result?
What is a step taken by a user or process in order to achieve a result?
- Action (correct)
- Attackers
- Target
- Objectives
What does a vulnerability refer to in computer security?
What does a vulnerability refer to in computer security?
What is an unauthorized consequence of an event called?
What is an unauthorized consequence of an event called?
Which one of the following is a means of exploiting a computer or network vulnerability?
Which one of the following is a means of exploiting a computer or network vulnerability?
What is an individual who attempts to take a series of steps to achieve an unauthorized result called?
What is an individual who attempts to take a series of steps to achieve an unauthorized result called?
What is a weakness in a system allowing unauthorized action called?
What is a weakness in a system allowing unauthorized action called?
What is an action directed at a target that is intended to result in a change of state or status of the target called?
What is an action directed at a target that is intended to result in a change of state or status of the target called?
What is the purpose or end goal of an incident called?
What is the purpose or end goal of an incident called?