Business & Finance Homework Help

10 pointsQUESTION 2Propagation vectors may leverage closed network connection,

10 points  

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

QUESTION 2

  1. Propagation vectors may leverage closed network connection,

file shares or software vulnerability

 True False

10 points  

QUESTION 3

  1. What is the definition of a threat?
  2. Attempt to cause damage to our comprise information of supporting systems
  3. Threat instance
  4. Object, person, other entity posing potential risk of loss to an asset
  5. Organizational resources being protected

10 points  

QUESTION 4

  1. What is the definition of exploit?
  2. Prevent attack
  3. Malicious code, malicious software, malware
  4. Flow or weakness in system security procedures design, implementation, internal controls.
  5. Flow or weakness in system security procedure, design, implementation, internal controls.

10 points  

QUESTION 5

  1. Well-meaning people send random e-mail warning of