Week 2 Quiz Question 1 1 / 1 pts Risk = ____________ + ___________ Attack Vector
ID: 356573 • Letter: W
Question
Week 2 Quiz
Question 1
1 / 1 pts
Risk = ____________ + ___________
Attack Vector + Vulnerability
Opportunity + Motivation
Threat + Opportunity
Actor + Action
Question 2
An internal trusted employee can be a Threat Actor
True
An accidental insider or disgruntled employee (insider threat) could both represent a threat actor.
False
Question 3
1 / 1 pts
Malware is a type of software patch used to correct a problem within an operating system or software program.
True
False
Malware is a software intended to damage or disable an operating system or computer
Question 4
All of the following are vulnerabilities except:
Hardware Flaws
Human Error
Software Bugs
System Monitoring
Unpatched System
Question 5
Attributing an attack to a specific state or actor is usually an easy process
True
False
Question 6
Perhaps the most famous example of Hacktivist organization is ____________ .
Morpheus
Siria Electronic Army
Wikinews
Anonymous
Question 7
The Board of Directors should insist on Cybersecurity Strategy and Plans that are complex and deeply technical, even if it means they need to bring in an outside consultant to understand the results.
True
False
Question 8
Which of the following best describes intellectual property?
All patents owned by a business
The personnel engaged in unique research
The items a business has copyrighted
The unique knowledge a business possesses
Question 9
All of the following are direct costs of cybercrime on the global economy except:
Employment Losses
Stolen Personal Information
Intellectual Property Theft
Environmental Degradation
Question 10
0 / 1 pts
The biggest weakness throughout most technologies is:
Passwords (and the people who create and use them)
Trust in the cloud
Insider Threat
Internet of Things
Explanation / Answer
1 Threat + Opportunity
There is a opportunity associated with risk along with threat of failure and loss.
True
Internal trusted employees can leak the sensitive data of the organization hence they are Threat Actor. An accidental insider or disgruntled employee whose is not satisfied some of the job factor can leak the sensitive data. Hence the options are true.
False
Malware is designed to corrupt, damage the system. Through malware illegal authorization on the system can be accessed. There are plenty of software available to tackle the Malwares.
System Monitoring
Vulnerabilities sometimes called weakness through which the hacker or attacker can get unauthorized action in a computer or system. Through system monitoring it can be prevented.
Max 4 questions in one go. Pl ask the rest questions separately.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.