Podcast
Questions and Answers
Which one of these is a threat vector?
Which one of these is a threat vector?
- Insider threat
- Weak password (correct)
- Hardware vulnerability
- Software vulnerability
Which one of these is NOT a type of threat faced by organizations online?
Which one of these is NOT a type of threat faced by organizations online?
- Phishing attacks
- Malware attacks
- Ransomware
- Firewall breaches (correct)
Which one of these is the main purpose of a risk plan?
Which one of these is the main purpose of a risk plan?
- To specify controls that reduce risks (correct)
- To eliminate all risks
- To address risks using insurance means
- To identify all threat vectors
Which one of these is a vulnerability?
Which one of these is a vulnerability?
Which one of these is NOT one of the six main routes a cybercriminal can exploit to gain access to a computer system?
Which one of these is NOT one of the six main routes a cybercriminal can exploit to gain access to a computer system?