Oreily CH2 Flashcards
1
Q
An IT vulnerability is a software or hardware state that, if exploited, would allow dangerous and unauthorized access to your infrastructure
A
vulnerabilty
2
Q
any possible exploit of a vulnerability.
A
threat
3
Q
Which of the following are among the primary goals of well-designed information security protocols?
A