Chapter 9 Quiz - Started on Monday 20 June 2011 06:21 PM...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Started on Monday, 20 June 2011, 06:21 PM Completed on Monday, 20 June 2011, 07:03 PM Time taken 41 mins 37 secs Grade 94 out of a maximum of 100 ( 94 %)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Question 1 Marks: 3 ____ generally denotes a potential negative impact to an asset. Choose one answer. a. Risk b. Threat c. Weakness d. Vulnerability Correct Marks for this submission: 3/3. Question 2 Marks: 3 ____ programs use the file of hashed passwords and then attempts to break the hashed passwords offline. Choose one answer. a. ICMP scanner b. Port scanner c. Password cracker d. Network mapper Correct Marks for this submission: 3/3. Question 3 Marks: 3 An asset is defined as any item that has a positive economic value, and ____________________ is the process of inventorying and managing these items. Answer: Correct Marks for this submission: 3/3. Question 4 Marks: 3
Background image of page 2
Identifying vulnerabilities through a(n) ____ determines the current security weaknesses that could expose assets to threats. Choose one answer. a. asset identification b. threat identification c. vulnerability appraisal d. risk mitigation Correct Marks for this submission: 3/3. Question 5 Marks: 3 ____________________ is the potential loss that exceeds the amount covered by insurance. Answer: Correct Marks for this submission: 3/3. Question 6 Marks: 3 ____________________ is a systematic and structured approach to managing the potential for loss that is related to a threat. Answer: Correct Marks for this submission: 3/3. Question 7 Marks: 3 ____ are typically used to determine the state of a port to know what applications are running and could be exploited. Choose one answer. a. Network scanners b. Port scanners c. Port testers
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
d. Network testers Correct Marks for this submission: 3/3. Question 8 Marks: 3 In information security, a ____ is the likelihood that a threat agent will exploit a vulnerability. Choose one answer. a. hole b. threat c. risk d. weakness Correct Marks for this submission: 3/3. Question 9
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 12

Chapter 9 Quiz - Started on Monday 20 June 2011 06:21 PM...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online