ExamGecko
Question list
Search
Search

Question 27 - IT Risk Fundamentals discussion

Report
Export

Which of the following are control conditions that exist in IT systems and may be exploited by an attacker?

A.

Cybersecurity risk scenarios

Answers
A.

Cybersecurity risk scenarios

B.

Vulnerabilities

Answers
B.

Vulnerabilities

C.

Threats

Answers
C.

Threats

Suggested answer: B

Explanation:

Control conditions that exist in IT systems and may be exploited by an attacker are known as vulnerabilities. Here's the breakdown:

Cybersecurity Risk Scenarios: These are hypothetical situations that outline potential security threats and their impact on an organization. They are not specific control conditions but rather a part of risk assessment and planning.

Vulnerabilities: These are weaknesses or flaws in the IT systems that can be exploited by attackers to gain unauthorized access or cause damage. Vulnerabilities can be found in software, hardware, or procedural controls, and addressing these is critical for maintaining system security.

Threats: These are potential events or actions that can exploit vulnerabilities to cause harm. While threats are important to identify, they are not the control conditions themselves but rather the actors or events that take advantage of these conditions.

Thus, the correct answer is vulnerabilities, as these are the exploitable weaknesses within IT systems.

asked 18/11/2024
Nagaretnam, Ravin
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first