Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Week 2 Quiz Question 1 1 / 1 pts Risk = ____________ + ___________ Attack Vector

ID: 356573 • Letter: W

Question

Week 2 Quiz

Question 1

1 / 1 pts

Risk = ____________ + ___________

Attack Vector + Vulnerability

Opportunity + Motivation

Threat + Opportunity

Actor + Action

Question 2

An internal trusted employee can be a Threat Actor

True

An accidental insider or disgruntled employee (insider threat) could both represent a threat actor.


False

Question 3

1 / 1 pts

Malware is a type of software patch used to correct a problem within an operating system or software program.

True

False

Malware is a software intended to damage or disable an operating system or computer



Question 4

All of the following are vulnerabilities except:

Hardware Flaws

Human Error

Software Bugs

System Monitoring

Unpatched System

Question 5

Attributing an attack to a specific state or actor is usually an easy process

True

False

Question 6

Perhaps the most famous example of Hacktivist organization is ____________ .

Morpheus

Siria Electronic Army

Wikinews

Anonymous


Question 7

The Board of Directors should insist on Cybersecurity Strategy and Plans that are complex and deeply technical, even if it means they need to bring in an outside consultant to understand the results.

True

False

Question 8

Which of the following best describes intellectual property?

All patents owned by a business

The personnel engaged in unique research

The items a business has copyrighted

The unique knowledge a business possesses

Question 9

All of the following are direct costs of cybercrime on the global economy except:

Employment Losses

Stolen Personal Information

Intellectual Property Theft

Environmental Degradation


Question 10

0 / 1 pts

The biggest weakness throughout most technologies is:

Passwords (and the people who create and use them)

Trust in the cloud

Insider Threat

Internet of Things


Explanation / Answer

1 Threat + Opportunity

There is a opportunity associated with risk along with threat of failure and loss.

True

Internal trusted employees can leak the sensitive data of the organization hence they are Threat Actor. An accidental insider or disgruntled employee whose is not satisfied some of the job factor can leak the sensitive data. Hence the options are true.

False

Malware is designed to corrupt, damage the system. Through malware illegal authorization on the system can be accessed. There are plenty of software available to tackle the Malwares.

System Monitoring

Vulnerabilities sometimes called weakness through which the hacker or attacker can get unauthorized action in a computer or system. Through system monitoring it can be prevented.

Max 4 questions in one go. Pl ask the rest questions separately.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote