Choose the correct answer.
Question[ 1/10
]
Which of the following refers to the potential danger that could exploit an existing vulnerability?
Choose the correct answer.
Question[ 2/10
]
What is the main concern of a security risk?
Choose the correct answer.
Question[ 3/10
]
Which of the following is an example of a security risk in an organization?
Choose the correct answer.
Question[ 4/10
]
What is a common method to mitigate security risks?
Choose the correct answer.
Question[ 5/10
]
In information security, a security risk is often associated with:
Choose the correct answer.
Question[ 6/10
]
What is a common method used by hackers to steal sensitive information?
Choose the correct answer.
Question[ 7/10
]
What is the term used for a weakness in a computer system that could be exploited by a threat?
Choose the correct answer.
Question[ 8/10
]
What is the practice of tricking someone into giving confidential information called?
Choose the correct answer.
Question[ 9/10
]
What is a type of attack where the goal is to overwhelm a system's resources and make it unavailable?
Choose the correct answer.
Question[ 10/10
]
What is the malicious software that blocks access to a computer system until a sum of money is paid?