Question: 1. What do we need to access a service over a network? A. insecure protocol B. zero-day

1.  What do we need to access a service over a network?
    A.     insecure protocol
    B.     zero-day vulnerability
    C.     unsecured root account
    D.     open port

2.  What is a vulnerability that provides everyone access to your files?
    A.     zero-day
    B.     outsourced code development
    C.     open permissions
    D.     on-premises vulnerabilities

3.  What is a program running in the background of an operating system which provides some functionality?
    A.     service
    B.     zero-day vulnerability
    C.     open port
    D.     unsecured root account

4.  Why might we have weak encryption on a device?
    A.     because the device has a zero-day vulnerability
    B.     because the device has outdated hardware and software
    C.     because the device has open ports and services
    D.     because the device has open permissions

5.  What helps with patch management?
    A.     applications
    B.     centralization and automation
    C.     firmware
    D.     operating systems

6.  What is a weakness that threat actors can exploit to cause harm to an organization?
    A.     firmware
    B.     vulnerability
    C.     reputation
    D.     supply chain

7.  _____ includes all the elements required to produce and sell a product
    A.     vendor support
    B.     supply chain
    C.     system integration
    D.     outsourced code development

8.  What are operating systems that are no longer in widespread use?
    A.     legacy platforms
    B.     firmware
    C.     insecure protocols
    D.     system integration

9.  _____ is when an organization chooses a 3rd party to develop code for the organization.
    A.     outsourced code development
    B.     system integration
    C.     vendor support
    D.     supply chain

10.  What are unknown software vulnerabilities?
    A.     insecure protocol vulnerabilities
    B.     default setting vulnerabilities
    C.     open permission vulnerabilities
    D.     zero-day vulnerabilities

Step by Step Solution

3.38 Rating (176 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

The detailed answer for the above question is provided below 1 option d Open port Explanation Spot website vulnerabilities before problems arise Under... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!