1. What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?
- data loss or manipulation
- disruption of service
- identify theft
- information theft
2. What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?
- data loss or manipulation
- disruption of service
- identify theft
- information theft
3. What kind of threat is described when a threat actor prevents legal users from accessing data services?
- data loss or manipulation
- disruption of service
- identify theft
- information theft
4. What kind of threat is described when a threat actor steals scientific research data?
- data loss or manipulation
- disruption of service
- identify theft
- information theft
5. What kind of threat is described when a threat actor overloads a network to deny other users network access?
- data loss or manipulation
- disruption of service
- identify theft
- information theft
6. What kind of threat is described when a threat actor alters data records?
- data loss or manipulation
- disruption of service
- identify theft
- information theft
7. What kind of threat is described when a threat actor is stealing the user database of a company?
- data loss or manipulation
- disruption of service
- identify theft
- information theft
8. What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?
- data loss or manipulation
- disruption of service
- identify theft
- information theft