The probability that a specific vulnerability within an organization will beĀ attacked by a threat is known as __________.
A. impact
B. likelihood
C. uncertainty
D. tolerance
Answer: B
You might also like to view...
Low resolution results in a higher clarity of the slide content
Indicate whether the statement is true or false
When planning an information system, a company must consider how a new system will interface with older systems, which are called horizontal systems.
Answer the following statement true (T) or false (F)
What combination of the following options will protect S3 objects from both accidental deletion and accidental overwriting?
A. Enable S3 versioning on the bucket. B. Access S3 data using only signed URLs. C. Disable S3 delete using an IAM bucket policy. D. Enable S3 Reduced Redundancy Storage. E. Enable multi-factor authentication (MFA) protected access.
Which of the following is a purpose of a VLAN?
A) Increases port speed B) Decreases bandwidth on a network C) Allows another connection to the router D) Segments broadcast traffic