Compare an attack surface to an attack window.

What will be an ideal response?


The way (software or methods) an exploit takes advantage of a vulnerability is called an attack surface. The timeframe in which a bad guy can exploit a vulnerability in an attack surface before patches are applied to prevent the exploit is called an attack window.
 

Computer Science & Information Technology

You might also like to view...

MC A(n)______ method may be called by clients of a class even if no objects of the class exist.

a) abstract. b) static. c) class. d) None of the above.

Computer Science & Information Technology

Match the following terms to their meanings:

I. Conditional formatting II. Alphabetic index III. Parameter query IV. Tab control V. Mini toolbar A. a query that prompts the user for criteria B. applies formatting to specific controls based on a comparison to a rule set C. miniature, semitransparent toolbar that is used to work with objects D. grouping of items by a common first character E. used to display data on the main form on different tabs

Computer Science & Information Technology

Which of the following options means that if a record on the "one" side of one-to-many relationship is deleted, all records in the "many" table are also deleted?

A. Cascade Repeat Values B. Cascade Application Parts C. Cascade Delete Related Records D. Cascade Delete Related Fields

Computer Science & Information Technology

You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently, your network runs of servers, routers, and switches that have not been upgraded for several years. You are still running the Windows Server 2003. When implementing dual stack, which of the following will be your primary concerns?

Keeping the hardware and software costs under control Ensuring that the hardware and software support the implementation Ensuring the same service-levels for the dual stack Ensuring that Internet Service Providers (ISPs) work with IPv6

Computer Science & Information Technology