Podcast
Questions and Answers
Which one of these is a threat vector?
Which one of these is a threat vector?
- Insider threat
- Weak password (correct)
- Hardware vulnerability
- Software vulnerability
Which one of these is NOT a type of threat faced by organizations online?
Which one of these is NOT a type of threat faced by organizations online?
- Phishing attacks
- Malware attacks
- Ransomware
- Firewall breaches (correct)
Which one of these is the main purpose of a risk plan?
Which one of these is the main purpose of a risk plan?
- To specify controls that reduce risks (correct)
- To eliminate all risks
- To address risks using insurance means
- To identify all threat vectors
Which one of these is a vulnerability?
Which one of these is a vulnerability?
Which one of these is NOT one of the six main routes a cybercriminal can exploit to gain access to a computer system?
Which one of these is NOT one of the six main routes a cybercriminal can exploit to gain access to a computer system?
Flashcards
What is a threat vector?
What is a threat vector?
A path or method used by attackers to gain access to a system. In this case, a easily guessable password.
What is a vulnerability?
What is a vulnerability?
A weakness in a system that can be exploited by a threat.
What is the main purpose of a risk plan?
What is the main purpose of a risk plan?
Specifies controls to reduce identified risks.
Is a firewall a cybercriminal route into a system?
Is a firewall a cybercriminal route into a system?
Signup and view all the flashcards