Podcast
Questions and Answers
What is a vulnerability in the context of information security?
What is a vulnerability in the context of information security?
- A weakness that could be exploited by a threat source (correct)
- The presence of adversaries seeking to exploit cyber resources
- The compromised information stored on systems
- The irreversible losses to an organization
How do vulnerabilities leave systems susceptible?
How do vulnerabilities leave systems susceptible?
- To the compromise of entire databases at an operations center
- To the presence of adversarial threat sources
- To a multitude of activities that can result in significant losses (correct)
- To natural disasters and erroneous actions by individuals
What type of threat source can exploit system vulnerabilities?
What type of threat source can exploit system vulnerabilities?
- Neither adversarial nor non-adversarial
- Adversarial and non-adversarial (correct)
- Only adversarial
- Only non-adversarial
What do adversarial threat sources seek to exploit?
What do adversarial threat sources seek to exploit?
Who can be known to defraud organizational systems?
Who can be known to defraud organizational systems?