3 Question and answer latest update
Threats,Attacks,and vulnerabilities are __________% in weighting
22%
Organizations think of security in terms of fitting ___________ ________ ___________
Locks on doors
Businesses do not make money by being secure. Rather Security protects the __________ of a
company
assets
What is a tangible asset?
A. Physical items such as buildings,furniture,computer equipment,etc...
B. An asset that has access to many networks
C. An asset that has control over many malicious software
D. An asset that is tangible with another systems router
The most important security models and research properties that secure a system is.......
A.Malicious software
B. Non-repudiation
C. Threat vulnerabilities
D. Cyber frameworks
In IT security, it is important to distinguish between concepts of _________, _______________, and
______________
Threat,vulnerability, and risk
The computer security division of the National Institute of Standards and Technology is responsible
for issuing.....
A. Federal information processing standards
B. Federal information security standards
C. Federal information of cyber attacks
D. Federal information of threat vulnerabilities
It is important to distinguish the types of _______________ in terms of location
Threat actors
Experts in computer security are popularly known as _____________