a) Attack
b) Threat
c) Vulnerability
d) Control
Answer: b
Explanation: Threat
Related Posts
The records of each patient that is receiving or has received treatment resembles which security concept ?
An impersonation of an authorised user is an example of a security threat.
A system resource that has a value and has to be protected is known as
What is Life cycle risk assessment ?
Controls that are intended to ensure that attacks are unsuccessful is analogous to ____________ in dependability engineering.
Controls that are intended to repel attacks is analogous to ____________ in dependability engineering.
What are security controls ?
Join The Discussion