Which of the following is not an issue raised regarding how private data is gathered and used?

  • School Emily Griffith Technical College
  • Course Title NETWORKING 312
  • Pages 3

This preview shows page 1 - 2 out of 3 pages.

Chapter 13 Review1.At what point in a vulnerability assessment would an attack tree be utilized?

Get answer to your question and much more

2.Which of the following is NOT true about privacy?

Get answer to your question and much more

3.Which of the following is NOT a risk associated with the use of private data?

Get answer to your question and much more

4.Which of the following is NOT an issue raised regarding how private data is gathered and used?

Get answer to your question and much more

5.Which of the following is a systematic and methodical evaluation of the exposure of assets toattackers, forces of nature, and any other entity that could cause potential harm?

Get answer to your question and much more

6.Which of these should NOT be classified as an asset?

Get answer to your question and much more

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 3 pages?

Upload your study docs or become a

Course Hero member to access this document

Tags

Computer program, attack, Port scanner, Nessus, following command line tools

What is pretexting quizlet?

Pretexting. A form of social engineering in which one individual lies to obtain confidential data about another individual.

Which of the following is the goal of a vulnerability scan?

Vulnerability scanning is the process of identifying security weaknesses and flaws in systems and software running on them. This is an integral component of a vulnerability management program, which has one overarching goal – to protect the organization from breaches and the exposure of sensitive data.

What is the role of Threat Modeling in performing a vulnerability assessment quizlet?

The role of threat modeling in performing a vulnerability assessment is that: Threat modeling focuses attention on boundaries between systems elements and the outside world, and this may help you discover poorly secured VPN or maintenance features or tunnels installed by malware.

Which scan examines the current security using a passive method?

Which scan examines the current security, in a passive method? A port scanner can be used to search a system for port vulnerabilities. The RADMIN port scanner is an example of this type of software.