COMPUTER THREATS SECURITY
WHAT IS A HACKER
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following is a system, program, or network that is the subject of a security analysis?
|
Owned system
|
|
Vulnerability
|
|
Exploited system
|
|
Target of evaluation
|
Explanation:
Detailed explanation-1: -The three main phases or steps of the security evaluation plan are Security Evaluation, Preparation, and Conclusion.
Detailed explanation-2: -Kelley and Moyle suggest four key criteria against which to evaluate cybersecurity goals: effectiveness, maturity, efficiency and alignment.
Detailed explanation-3: -The statement is TRUE because white-box testing is a security audit performed on the internal network of an organization by network administration. The opposite would be black-box testing, which is a security audit on a system that the hacker knows nothing about.
There is 1 question to complete.