nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #28

CERTIFIED-IN-CYBERSECURITY Question #28: Real Exam Question with Answer & Explanation

The correct answer is C: Vulnerability. A Vulnerability is a weakness in an information system, system security procedures, internal controls or implementation that could be exploited by a Threat source (NIST SP 800-30 Rev 1). The Threat is the circumstance or event that can adversely impact operations. A Risk is a pos

Security Principles

Question

An exploitable weakness or flaw in a system or component is a:

Options

  • ARisk
  • BBug
  • CVulnerability
  • DThreat

Explanation

A Vulnerability is a weakness in an information system, system security procedures, internal controls or implementation that could be exploited by a Threat source (NIST SP 800-30 Rev 1). The Threat is the circumstance or event that can adversely impact operations. A Risk is a possible event that can negatively impact the organization. A Bug is a flaw causing an application to produce an unintended or unexpected result that may be exploitable.

Topics

#Vulnerability#Cybersecurity Fundamentals#Security Concepts#Threats and Vulnerabilities

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions