2026
From the following list, select all types of events and
conditions that are considered cybersecurity threats.
Misuse or abuse of IT assets
Insufficient IT assets for long-term goals
Intentional events
Failure of IT assets
Errors, weaknesses, or defects in IT assets
Unintentional, accidental, and incidental events - Correct
Answers ✅Misuse or abuse of IT assets
Intentional events
Failure of IT assets
Errors, weaknesses, or defects in IT assets
Unintentional, accidental, and incidental events
Suppose an organization's system is vulnerable to losing
information because its automated backup of data is
insufficient or substandard. This type of cybersecurity
vulnerability is - Correct Answers ✅a weakness in the
application software
What is the correct definition of a cybersecurity exploit? -
Correct Answers ✅A tool or technique for taking
advantage of a cybersecurity vulnerability to break into a
system and cause harm.
,Cybersecurity Q & As (Verified Answers)
2026
Which of the following are considered cybersecurity
breaches? More than one option may be correct.
Security patches
Distributed Denial of Service (DDOS)
Viruses
Impersonation
Spyware - Correct Answers ✅Viruses
Spyware
Impersonation
Distributed Denial of Service (DDOS)
The term "cybersecurity threat mitigation" refers to all of the
policies, procedures, and tools used to - Correct Answers
✅guard against threats such as security incidents, data
breaches, and unauthorized network access, and reduce any
harm they cause
The main characteristics that define cybersecurity threats are
disruptions that are minor, threats that may cause the loss of
IT assets, and hazards that always result in asset loss
events that can lead to IT asset loss, conditions that can lead
to IT asset loss, and the consequences of such loss
,Cybersecurity Q & As (Verified Answers)
2026
threats caused by intentional actions or events, unintentional
or accidental events, and incidental or minor events
dangers that threaten the security of data and information,
threaten a system's software, and threaten its hardware -
Correct Answers ✅events that can lead to IT asset loss,
conditions that can lead to IT asset loss, and the
consequences of such loss
From the following list, select all types of cybersecurity
vulnerabilities.
Weaknesses or flaws in system security control
Weaknesses in system security procedures
Security weaknesses in an operating system or application
software
Weaknesses or flaws in system security implementation
Weaknesses in the database of known vulnerabilities
Weaknesses or flaws in a system's security design - Correct
Answers ✅Weaknesses or flaws in system security control
Weaknesses in system security procedures
Weaknesses or flaws in a system's security design
Weaknesses or flaws in system security implementation
Security weaknesses in an operating system or application
software
, Cybersecurity Q & As (Verified Answers)
2026
______ are cybersecurity breaches that make a computer or
online service unavailable to its users. - Correct Answers
✅DDOS
In cybersecurity, the term "social engineering" refers to -
Correct Answers ✅the unlawful manipulation of people in
order to obtain and misuse their personal information
Which of these defining components mitigate cybersecurity
threats? Select all the correct options.
Policies, tools, and strategies used to reduce damage from
threats.
Security tools and oversight used to identify security threats.
Human resources such as IT staff trained in cybersecurity.
Policies and procedures used to protect systems and data. -
Correct Answers ✅Policies and procedures used to protect
systems and data.
Security tools and oversight used to identify security threats.
Policies, tools, and strategies used to reduce damage from
threats.
Which of the following are assets that can be impacted by a
cybersecurity threat? Select all the correct options.