Propagation vectors may leverage closed network connection,

Propagation vectors may leverage closed network connection,

10 points  

QUESTION 2

  1. Propagation vectors may leverage closed network connection,

file shares or software vulnerability

True False10 points  

QUESTION 3

  1. What is the definition of a threat?
  2. Attempt to cause damage to our comprise information of supporting systems
  3. Threat instance
  4. Object, person, other entity posing potential risk of loss to an asset
  5. Organizational resources being protected

10 points  

QUESTION 4

  1. What is the definition of exploit?
  2. Prevent attack
  3. Malicious code, malicious software, malware
  4. Flow or weakness in system security procedures design, implementation, internal controls.
  5. Flow or weakness in system security procedure, design, implementation, internal controls.

10 points  

QUESTION 5

  1. Well-meaning people send random e-mail warning of