Cybersecurity Threats and Vulnerabilities Quiz
5 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which one of these is a threat vector?

  • Insider threat
  • Weak password (correct)
  • Hardware vulnerability
  • Software vulnerability
  • Which one of these is NOT a type of threat faced by organizations online?

  • Phishing attacks
  • Malware attacks
  • Ransomware
  • Firewall breaches (correct)
  • Which one of these is the main purpose of a risk plan?

  • To specify controls that reduce risks (correct)
  • To eliminate all risks
  • To address risks using insurance means
  • To identify all threat vectors
  • Which one of these is a vulnerability?

    <p>Weakness in software</p> Signup and view all the answers

    Which one of these is NOT one of the six main routes a cybercriminal can exploit to gain access to a computer system?

    <p>Firewall</p> Signup and view all the answers

    More Like This

    ICT Security Threats Level 6: Risk Management
    5 questions
    Cybersecurity threats and controls
    10 questions

    Cybersecurity threats and controls

    AdvantageousVerisimilitude avatar
    AdvantageousVerisimilitude
    CYB281 Chapter 2: Cyber Risks and Threats
    40 questions
    Use Quizgecko on...
    Browser
    Browser