10 Questions
Which one of the following best defines a computer security risk?
An event or action that could cause a loss or damage to computer hardware, software, or processing capability.
What is the purpose or end goal of an incident?
Objectives
What is a step taken by a user or process in order to achieve a result?
Action
What does a vulnerability refer to in computer security?
A weakness in a system allowing unauthorized action.
What is an unauthorized consequence of an event called?
Unauthorized result
Which one of the following is a means of exploiting a computer or network vulnerability?
Tool
What is an individual who attempts to take a series of steps to achieve an unauthorized result called?
Attacker
What is a weakness in a system allowing unauthorized action called?
Vulnerability
What is an action directed at a target that is intended to result in a change of state or status of the target called?
Event
What is the purpose or end goal of an incident called?
Objectives
Test your knowledge on computer security risks and taxonomy with this quiz. Learn about attackers, tools, vulnerabilities, actions, targets, and unauthorized results. Assess your understanding of the steps involved in achieving an unauthorized result and how to protect against potential threats.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free