16.1.4 Check Your Understanding – Security Threats and Vulnerabilities Answers

1. What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive?

  • data loss or manipulation
  • disruption of service
  • identify theft
  • information theft

Explanation: Sending a virus that will format the hard drive of a computer is an example of data loss or manipulation threat.

2. What kind of threat is described when a threat actor makes illegal online purchases using stolen credit information?

  • data loss or manipulation
  • disruption of service
  • identify theft
  • information theft

Explanation: Using stolen credit or identity information to make illegal online purchases is an example of identity theft.

3. What kind of threat is described when a threat actor prevents legal users from accessing data services?

  • data loss or manipulation
  • disruption of service
  • identify theft
  • information theft

Explanation: Disruption of service attacks occur when legitimate users are prevented from accessing data and services.

4. What kind of threat is described when a threat actor steals scientific research data?

  • data loss or manipulation
  • disruption of service
  • identify theft
  • information theft

Explanation: Stealing research data or proprietary information is an example of information theft.

5. What kind of threat is described when a threat actor overloads a network to deny other users network access?

  • data loss or manipulation
  • disruption of service
  • identify theft
  • information theft

Explanation: Disruption of service attacks occur when legitimate users are prevented from accessing data and services or the network.

6. What kind of threat is described when a threat actor alters data records?

  • data loss or manipulation
  • disruption of service
  • identify theft
  • information theft

Explanation: Altering data records is an example of data loss or manipulation.

7. What kind of threat is described when a threat actor is stealing the user database of a company?

  • data loss or manipulation
  • disruption of service
  • identify theft
  • information theft

Explanation: Stealing data records or proprietary information is an example of information theft.

8. What kind of threat is described when a threat actor impersonates another person to obtain credit information about that person?

  • data loss or manipulation
  • disruption of service
  • identify theft
  • information theft

Explanation: Using identity information to impersonate someone to obtain credit is an example of identity theft.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x