A(n) ____________________ is an act or action that takes advantage of a vulnerability to compromisea controlled system.(Points : 2)
A(n) ____________________ is an identified weakness in a controlled system, where controls are not
present or are no longer effective.(Points : 2)
The timing attack
works by exploring the contents of a ____________________.(Points : 2)
Web browser's cache
9” fraud is an example of a(n) ____ attack.
(Points : 2)Social EngineeringWormSPAMTiming
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enterpremises or systems they have not been authorized to enter.(Points : 2)NatureTrespass
Which of the following functions does information security perform for an organization?(Points : 2)
Protects the organization’s ability to func
Enables the safe operation of applications implemented on the organization’s IT systems
Protects the data the organization collects and uses.
All of the aboveNone of the above
An attempt to gain personal information from an invidual is what kind of attack? Choose the bestanswer. (Points : 2)TrojanVirus