SYSTEMS DEVELOPMENT ANALYSIS
SYSTEMS DEVELOPMENT METHODS AND TOOLS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
flood
|
|
without deleting data, disposal of storage media
|
|
unchanged default password
|
|
latest patches and updates not done
|
Detailed explanation-1: -3. From the options below, which of them is not a vulnerability to information security? Explanation: Flood comes under natural disaster which is a threat to any information and not acts as a vulnerability to any system.
Detailed explanation-2: -6. Which of the following is not a vulnerability of the application layer? Explanation: Application design flaws may bypass security controls, inadequate security controls as well as logical bugs in programs may be by chance or on purpose be used for crashing programs.
Detailed explanation-3: -The correct answer is Debugging.
Detailed explanation-4: -Explanation: Vulnerabilities is defined as the weakness in a system that can be exploited by cyber-criminals and attackers.