QUESTIONS WITH DETAILED VERIFIED ANSWERS;
ALREADY GRADED A; 2025
including enough detail to allow an attacker to exploit the vulnerability - ANS-When
disclosing a security vulnerability in a system or software, the manufacturer should
avoid __________
botnet - ANS-Performs distributed denial of service (DDoS) attacks in which thousands
of individual computers send overwhelming amounts of traffic at a victim's computer
security requirements - ANS-addresses identified security risks
attack signifigance - ANS-attack likelihooods X attack impact
supervisory data control and acquisition (SCADA) - ANS-a system the controls motors,
valves, and other devices in industrial applications. It is not supposed to be connected
to the internet
reasoned paranoia - ANS-exemplified by a rational security decision, such as locking
your vehicle when not in use
security theater - ANS-refers to security measures intended to make potential victims
feel safe and secure without regard to their effectiveness
RMF - ANS-a security category with a high level estimate of the impact caused by cyber
security failures
3% - ANS-the percent rate of loss due to theft, damages, and other causes expected by
typical retail businesses
CIA - ANS-confidentiality, integrity, availability
cracker - ANS-a person who has learned specific attacks on computer systems and can
use those specific attacks