1. Potential weaknesses in IT infra structure through which a cyber attack might occur is called .---------
1 point
Clear selection
2. Vulnerability for cyber attack may be in----------
1 point
Clear selection
3. To protect the network infra structure from vulnerability, -------------is setup.
1 point
Clear selection
4. The person using vulnerability in operating system or application software or ITinfrastructure to intrude in to the computer of a victim is called .
1 point
Clear selection
5. Periodic assessment of security vulnerability in computer systems is called--------audit.
1 point
Clear selection
6. Maintaining computers free from cyberattack is called-----------
1 point
Clear selection
7. The security audit team---------- to keep the computers safe from cyber attacks
1 point
Clear selection
8. To ensure information safety,-----------should be implemented.
1 point
Clear selection
9. Protecting access to a computer through-----------is called access control.
1 point
Clear selection
10. A single point of access for several networking services is called .