Question

A vulnerability in software or operating system a. can result in an attack at any time...

A vulnerability in software or operating system

a. can result in an attack at any time

b. is an attack already

c. is a threat due to an exploit

d. will result in an attack soon

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer: a. can result in an attack at any time.

Vulnerability is a weakness in a operating system or software which might be exploited by an attacker for gaining unauthorised access to the system. It is not an attack, or a threat due to exploit. If the vulnerability goes unnoticed, then it won't result in attack.

Add a comment
Know the answer?
Add Answer to:
A vulnerability in software or operating system a. can result in an attack at any time...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • "Security Updates" for software (e.g., Microsoft Windows operating systems, Adobe Flash Player, etc.) and firmware (e.g.,...

    "Security Updates" for software (e.g., Microsoft Windows operating systems, Adobe Flash Player, etc.) and firmware (e.g., firmware in a home use, consumer 'Wi-Fi Router') are designed to patch (fix) vulnerabilities. True False A company is the victim of a cyber attack in which a previously unknown vulnerability in a webserver is exploited. Which statement is true? The company that was attacked will immediately find information on the vulnerability in the National Vulnerability Database (NVD). This attack is known as a...

  • In an operating system, whenever the user is about to install new software, a pop-up screen...

    In an operating system, whenever the user is about to install new software, a pop-up screen appears displaying details and asks the user to approve installation or to abort. Many programs are signed by a software vendor, with a certi cate for that vendor from a trusted CA; in this case, the pop-up screen displays the (certi ed) name of the vendor and the (signed) name of the program. Other software programs are not signed, or the software vendor is...

  • 1. The __________ group reflects the characteristics of a vulnerability that may change over time but...

    1. The __________ group reflects the characteristics of a vulnerability that may change over time but not across user environments. a. Base Metric b. Temporal Metric c. Environmental Metric d. Impact Metric 2. The ____________ group represents the characteristics of a vulnerability that are relevant and unique to a particular organization's environment. a. Base Metric b. Temporal Metric c. Environmental Metric d. Exploit Code Maturity Metric

  • Most cyber-attacks happen because vulnerabilities in system or application software. Buffer Overflow, SQL Injection, Code/OS Command...

    Most cyber-attacks happen because vulnerabilities in system or application software. Buffer Overflow, SQL Injection, Code/OS Command Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery and Race Conditions are very common vulnerabilities. (Refer to both NIST/DHS and MITRE databases of common vulnerabilities (http://nvd.nist.gov/cwe.cfm; http://cwe.mitre.org/top25/).) For this conference, explain what a specific vulnerability is, describe a famous attack that leveraged it (For example, the Morris worm leveraged the buffer overflow vulnerability), and how it can be prevented/minimized. Your post can either discuss a...

  • Which of the following is not a step of AES? a. Byte Substitution b. Add Round...

    Which of the following is not a step of AES? a. Byte Substitution b. Add Round key c. Mix Column d. Choice Permutation Which of the following is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or data on the system? a. Risk b. Exploit c. Mitigation d. Vulnerability Which of the following is not a phase in a worm attack? a. Paralyze b. Propagate c. Eradicate d. Persist The...

  • a) One of your friends is concerned that attackers could be exploiting a vulnerability in software...

    a) One of your friends is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. In this regard he/she has asked for your help. Identify the type of attack for which your friend is worried and propose a solution. b) You have recently joined a large enterprise as an information security officer. In a recent meeting, you were asked which of the standard networking devices...

  • Which of the following is NOT a feature of the Linux operating system? A. It can...

    Which of the following is NOT a feature of the Linux operating system? A. It can be used as a command-line interface. B. It can be used through a graphical user interface. C. It is desktop compatible. D. It can be used only with proprietary software.

  • 1.   What are the important considerations in choosing a Red Team (or attack team) for your software...

    1.   What are the important considerations in choosing a Red Team (or attack team) for your software system? Give examples to justify your position. 2.   How should you utilize the results of a static analysis of the system? What criteria should determine the level of action taken on any item? 3.   Why is it important to probe and attack a system both at rest and in action? Give examples of information that is provided by each that the other could not provide. 4.   What...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • 1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost....

    1) Information security procedures protect information integrity A) preventing fictitious transactions. B) reducing the system cost. C) making the system more efficient. D) making it impossible for unauthorized users to access the system. 2) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT