Which of the following is the best example of a threat agent?

A. A poor configuration in the authentication system
B. A zero-day attack
C. A flaw in the source code of a firewall
D. A disgruntled employee


Answer: D. A disgruntled employee

Computer Science & Information Technology

You might also like to view...

In which type of social media are posts are limited to a small number of characters and users post updates frequently?

a. Microblog b. Forum c. Wiki

Computer Science & Information Technology

Pressing the Enter key at the terminal generates a newline character, ____.

A. \0 B. \e C. \r D. \n

Computer Science & Information Technology

____ is a network layer protocol. It performs tasks such as routing, carrying datagrams, and mapping an Internet address to a physical network address.

A. TCP B. IP C. UDP D. ICMP

Computer Science & Information Technology

The main problem with the ____ approach is the sheer volume of data that the system logs produce.

A. audit-based B. review-based C. change-based D. control-based

Computer Science & Information Technology