The potential for a negative event to occur is a vulnerability. True False 1.00000 points QUESTION 2 Which of the following is an example of a user domain vulnerability? a.Your laptop NIC failsb.You spill coffee on your laptopc.Your laptop faces a denial of service attackd.You configure a weak password or share it with others 1.00000 points QUESTION 3 Purchasing cyber insurance to cover the loss of revenue during a denial-of-service attack is an example of which of the following risk management techniques?a.Avoidanceb.Acceptancec.Transferd.Mitigation 1.00000 points QUESTION 4 Disconnecting a Web server from the Internet so it wont be hacked is an example of which of the following risk management techniques?a.Acceptanceb.Transferc.Avoidanced.Mitigation 1.00000 points QUESTION 5 Which of the following organizations operates within the Department of Homeland Security, serving as a central point of contact for securing cyberspace.a.NCCICb.NISTc.US-CERTd.Mitres CVE 1.00000 points QUESTION 6 Which of the following organizations provides guidance documents, such as those in their Special Publications (SP) 800 series?a.NCCICb.NISTc.US-CERTd.Mitres CVE 1.00000 points QUESTION 7 Which of the following is NOT an unintentional threat?a.A Denial-of-Service attack against the Web server.b.The janitor trips over a cord in the computer room that was exposed on the floor and crashes a server.c.A hard drive in a server fails.d.A hurricane floods the computer room. 1.00000 points QUESTION 8 Which of the following is an example of an intentional threat?a.Malware, such as ransomware, infects a computer b.An electrical fire in the computer roomc.A program was not written with security in mind, so has many bugsd.Cheap hard drives were purchased from China having a high rate of failure 1.00000 points QUESTION 9 An attack in which more data that what a program was designed to handle is best described as a/an:a.LDAP Injectionb.Buffer Overflowc.DDoS Attackd.SQL Injection QUESTION 10 Vulnerability/Threat Pairs. Match the following vulnerabilities with its associated threa Malware infection—- a. Server does not have sufficient RAM/CPU resources b. Outdated antivirus c. Equipment Failure d. Fire e. SQL Injection due to poorly-implemented database application f. Weak password policy Potential for denial-of-service attack to be successful—- a. Server does not have sufficient RAM/CPU resources b. Outdated antivirus c. Equipment Failure d. Fire e. SQL Injection due to poorly-implemented database application f. Weak password policy Damage to severs and other IT assets—- a. Server does not have sufficient RAM/CPU resources b. Outdated antivirus c. Equipment Failure d. Fire e. SQL Injection due to poorly-implemented database application f. Weak password policy Unauthorized access —- a. Server does not have sufficient RAM/CPU resources b. Outdated antivirus c. Equipment Failure d. Fire e. SQL Injection due to poorly-implemented database application f. Weak password policy Unauthorized disclosure of data in a database —- a. Server does not have sufficient RAM/CPU resources b. Outdated antivirus c. Equipment Failure d. Fire e. SQL Injection due to poorly-implemented database application f. Weak password policy Resources are unavailable to users when they need them —- a. Server does not have sufficient RAM/CPU resources b. Outdated antivirus c. Equipment Failure d. Fire e. SQL Injection due to poorly-implemented database application f. Weak password policy
Looking for solution of this Assignment?
WHY CHOOSE US?
We deliver quality original papers |
Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected |
Free revisions |
We offer our clients multiple free revisions just to ensure you get what you want. |
Discounted prices |
All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount |
100% originality |
We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI |
On-time delivery |
We will deliver your paper on time even on short notice or short deadline, overnight essay or even an urgent essay |