Which of the following is the best example of a threat agent?
A. A poor configuration in the authentication system
B. A zero-day attack
C. A flaw in the source code of a firewall
D. A disgruntled employee
Answer: D. A disgruntled employee
You might also like to view...
In which type of social media are posts are limited to a small number of characters and users post updates frequently?
a. Microblog b. Forum c. Wiki
Pressing the Enter key at the terminal generates a newline character, ____.
A. \0 B. \e C. \r D. \n
____ is a network layer protocol. It performs tasks such as routing, carrying datagrams, and mapping an Internet address to a physical network address.
A. TCP B. IP C. UDP D. ICMP
The main problem with the ____ approach is the sheer volume of data that the system logs produce.
A. audit-based B. review-based C. change-based D. control-based