Podcast
Questions and Answers
What is a threat actor?
What is a threat actor?
- An intruder who gains access by exploiting software vulnerabilities (correct)
- Someone who steals important information or assets
- An individual who guesses someone's username and password
- A person who causes disruption of service on a network
What are the primary vulnerabilities or weaknesses in a network or device?
What are the primary vulnerabilities or weaknesses in a network or device?
- Technological Vulnerabilities, such as TCP/IP Protocol weaknesses (correct)
- External Threats, such as malware and viruses
- Environmental Vulnerabilities, such as physical security
- Human Errors, such as incorrect configurations
What is an example of a type of threat that may arise after an intruder gains access to a network?
What is an example of a type of threat that may arise after an intruder gains access to a network?
- Unauthorized access to network devices
- Data Loss and manipulation (correct)
- Loss of employee productivity
- Physical damage to network infrastructure
What is the degree of weakness in a network or device called?
What is the degree of weakness in a network or device called?
What are the types of attacks that can result in a loss of time and money due to damage or theft of important information or assets?
What are the types of attacks that can result in a loss of time and money due to damage or theft of important information or assets?