1. What do we need to access a service over a network? A. ...
Question:
1. What do we need to access a service over a network?
A. insecure protocol
B. zero-day vulnerability
C. unsecured root account
D. open port
2. What is a vulnerability that provides everyone access to your files?
A. zero-day
B. outsourced code development
C. open permissions
D. on-premises vulnerabilities
3. What is a program running in the background of an operating system which provides some functionality?
A. service
B. zero-day vulnerability
C. open port
D. unsecured root account
4. Why might we have weak encryption on a device?
A. because the device has a zero-day vulnerability
B. because the device has outdated hardware and software
C. because the device has open ports and services
D. because the device has open permissions
5. What helps with patch management?
A. applications
B. centralization and automation
C. firmware
D. operating systems
6. What is a weakness that threat actors can exploit to cause harm to an organization?
A. firmware
B. vulnerability
C. reputation
D. supply chain
7. _____ includes all the elements required to produce and sell a product
A. vendor support
B. supply chain
C. system integration
D. outsourced code development
8. What are operating systems that are no longer in widespread use?
A. legacy platforms
B. firmware
C. insecure protocols
D. system integration
9. _____ is when an organization chooses a 3rd party to develop code for the organization.
A. outsourced code development
B. system integration
C. vendor support
D. supply chain
10. What are unknown software vulnerabilities?
A. insecure protocol vulnerabilities
B. default setting vulnerabilities
C. open permission vulnerabilities
D. zero-day vulnerabilities
Financial Accounting Information For Decisions
ISBN: 978-0324672701
6th Edition
Authors: Robert w Ingram, Thomas L Albright