Week 1 – Understanding Security Threats Post author:Devendra Kumar Post published: Post comments:0 Comments it security defense against the digital dark arts week 1 answers Malicious Software 1. In the CIA Triad, "Confidentiality" means ensuring that data is: Answers accurate and was not tampered with.available and that people can access it.not accessible by unwanted parties.accessible anonymously. 2. In the CIA Triad, "Integrity" means ensuring that data is: Answers available and that people can access it.truthful and honest.accurate and was not tampered with.not accessible by unwanted parties. 3. In the CIA Triad, "Availability" means ensuring that data is: Answers available to anyone from anywhere.available and people can access it.not accessible by unwanted parties.accurate and was not tampered with. 4. What's the relationship between a vulnerability and an exploit? Answers An exploit creates a vulnerability in a system.An exploit takes advantage of a vulnerability to run arbitrary code or gain access.They’re unrelated.A vulnerability takes advantage of an exploit to run arbitrary code or gain access. 5. Which statement is true for both a worm and a virus? Answers They infect other files with malicious code.They’re self-replicating and self-propagating.They don’t cause any harm to the target system.They’re undetectable by antimalware software. 6. Check all examples of types of malware: Answers AdwareVirusesWormsKey Generators 7. What are the characteristics of a rootkit? Check all that apply. Answers Is harmlessIs difficult to detectIs destructiveProvides elevated credentials Next Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Devendra Kumar Project Management Apprentice at Google You Might Also Like Activity: Complete a personal closing report Project Management and Its Importance Leave a Reply Cancel replyCommentEnter your name or username to comment Enter your email address to comment Enter your website URL (optional) Save my name, email, and website in this browser for the next time I comment.