0 of 9 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 9 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
What is spoofing?
What is a poison attack?
What are some attibutes of a threat actor? (Choose All That Apply)
Who can compromise your system
_________________ is the likelihood and impact (or consequence) of a threat actor exploiting a vulnerability
_________________ is a weakness that could be triggered accidentally or exploited intentionally to cause a security breach
_________________ is the potential for someone or something to exploit a vulnerability and breach security.
Points where an attacker can discover or exploit vulnerabilities in a network or application is know as?