Cybersecurity Threats and Vulnerabilities Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which one of these is a threat vector?

  • Insider threat
  • Weak password (correct)
  • Hardware vulnerability
  • Software vulnerability

Which one of these is NOT a type of threat faced by organizations online?

  • Phishing attacks
  • Malware attacks
  • Ransomware
  • Firewall breaches (correct)

Which one of these is the main purpose of a risk plan?

  • To specify controls that reduce risks (correct)
  • To eliminate all risks
  • To address risks using insurance means
  • To identify all threat vectors

Which one of these is a vulnerability?

<p>Weakness in software (C)</p> Signup and view all the answers

Which one of these is NOT one of the six main routes a cybercriminal can exploit to gain access to a computer system?

<p>Firewall (D)</p> Signup and view all the answers

Flashcards

What is a threat vector?

A path or method used by attackers to gain access to a system. In this case, a easily guessable password.

What is a vulnerability?

A weakness in a system that can be exploited by a threat.

What is the main purpose of a risk plan?

Specifies controls to reduce identified risks.

Is a firewall a cybercriminal route into a system?

Firewalls are security measures, not routes of exploitation.

Signup and view all the flashcards

More Like This

Cybersecurity threats and controls
10 questions

Cybersecurity threats and controls

AdvantageousVerisimilitude avatar
AdvantageousVerisimilitude
CYB281 Chapter 2: Cyber Risks and Threats
40 questions
Use Quizgecko on...
Browser
Browser