5 Questions
What is a threat actor?
An intruder who gains access by exploiting software vulnerabilities
What are the primary vulnerabilities or weaknesses in a network or device?
Technological Vulnerabilities, such as TCP/IP Protocol weaknesses
What is an example of a type of threat that may arise after an intruder gains access to a network?
Data Loss and manipulation
What is the degree of weakness in a network or device called?
Vulnerability
What are the types of attacks that can result in a loss of time and money due to damage or theft of important information or assets?
Attacks through software vulnerabilities, hardware attacks, and guessing someone's username and password
Test your knowledge of network security fundamentals with this quiz covering the types of security threats and vulnerabilities. Explore various attack scenarios and learn about potential risks to networks and valuable assets.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free