Assets, Threats, and Vulnerabilities | Weekly challenge 1 Quiz |
A malicious hacker gains access to a company system in order to access sensitive information. What does this scenario describe?
- Threat
- Procedure
- Regulation
- Vulnerability
Assets, Threats, and Vulnerabilities | Weekly challenge 1 Quiz |
A malicious hacker gains access to a company system in order to access sensitive information. What does this scenario describe?