Match each term with the correct statement below.
A. taking advantage of a vulnerability
B. the storage area in which SNMP software agents store their data
C. a type of action that has the potential to cause harm
D. a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is a potential harm
E. a policy that defines the actions users may perform while accessing systems and networking equipment
F. the task of identifying and categorizing assets
G. adjustments to a WLAN performed as part of routine maintenance
H. a record of events
I. the likelihood that a threat agent will exploit a vulnerability
J. a flaw or weakness that allows a threat agent to bypass security
A. exploiting
B. MIB
C. threat
D. impact analysis
E. acceptable use policy
F. asset management
G. RF site tuning
H. event log
I. risk
J. vulnerability
You might also like to view...
A(n) ____ anomaly occurs when a user deletes data from a database and unintentionally deletes the only occurrence of that data in the database.
A. update B. deletion C. append D. purging
The Charms menu appears when you move the pointer to one of the corners of the screen.
Answer the following statement true (T) or false (F)
The Remove Comments button allows you to delete unwanted comments
Indicate whether the statement is true or false
In a networked environment, no authorized computer user can access data and information stored on other computers on the network.
Answer the following statement true (T) or false (F)