Business & Finance Homework Help

10 pointsQUESTION 2Propagation vectors may leverage closed network connection,

10 points  

QUESTION 2

  1. Propagation vectors may leverage closed network connection,

file shares or software vulnerability

 True False

10 points  

QUESTION 3

  1. What is the definition of a threat?
  2. Attempt to cause damage to our comprise information of supporting systems
  3. Threat instance
  4. Object, person, other entity posing potential risk of loss to an asset
  5. Organizational resources being protected

10 points  

QUESTION 4

  1. What is the definition of exploit?
  2. Prevent attack
  3. Malicious code, malicious software, malware
  4. Flow or weakness in system security procedures design, implementation, internal controls.
  5. Flow or weakness in system security procedure, design, implementation, internal controls.

10 points  

QUESTION 5

  1. Well-meaning people send random e-mail warning of 
 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"