Which term represents a potential danger that could take advantage of a weakness in a system?
A. vulnerability
B. risk
C. threat
D. exploit
Which term represents a potential danger that could take advantage of a weakness in a system?
A. vulnerability
B. risk
C. threat
D. exploit
An asset is anything of value to an organization.
A vulnerability is a weakness in a system or its design that could be exploited by a threat.
A threat is a potential danger to information or systems.
A risk is the likelihood that a particular vulnerability will be exploited.
An exploit is an attack performed against a vulnerability.
The answer is C: Threat
Key here is “a Potential danger” the rest is just information to confuse.
By adding the word “could” displaces the “Vulnerability” answer as that would be considered an already know weakness to a system or design.
A risk is the likelihood of the exploit, and Exploit is the attack completed.
D. exploit
A vulnerability is an exploitable weakness in a system or its design.
A risk: In the world of cyber security, risk can be defined as the possibility of a security incident (something bad)
happening.
A threat is any potential danger to an asset. If a vulnerability exists but has not
yet been exploited—or, more importantly, it is not yet publicly known—the
threat is latent and not yet realized.
An exploit is software or a sequence of commands that takes advantage of a
vulnerability in order to cause harm to a system or network.
In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
Source:
https://en.wikipedia.org/wiki/Threat_(computer)
الاجابة الصح D
لاني بالفعل النظام فية صغرة كما هوة مذكور والسؤال اية الحاجة اللي تخليك تاخد افضلية علي نظام فية صغرة دي بعد التعريفات من سيسكو نفسها هتشرح اللي بقولة
2.2 Compare and contrast these concepts:
2.2.a Risk 5.4 √
Function of likelihood of given threat source to exercising particular potential vulnerability, and the resulting impact of that adversary on the organization. Risk=thrat+vulnerability+impact
2.2.b Threat 5.4 √
Potential of threat source to exercise(exploit) specific vulnerability
2.2.c Vulnerability 5.5, 5.4 √
Weakness that make resource susceptible to the threat.
2.2.d Exploit (to use a vulnerability) √
Potential danger that can take advantage of week in the system
The answer is C.
Key Concepts
An asset is anything of value to an organization.
A vulnerability is a weakness in a system or its design that could be exploited by a threat.
A threat is a potential danger to information or systems.
A risk is the likelihood that a particular vulnerability will be exploited.
An exploit is an attack performed against a vulnerability.
A countermeasure (safeguard) is the protection that mitigates the potential risk.
Yes , a reference from Cisco press:
http://www.ciscopress.com/articles/article.asp?p=1998559
Risk
You’ll find many definitions when you search the term risk. One that I find the simplest to understand is “the potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability” [TAG]. This ties the terminology we’ve reviewed – asset, threat, vulnerability, exploit – together quite neatly. In practice, for every asset, you identify the set of threats that could harm the asset. You then identify the vulnerabilities that threat actors could exploit to harm that asset. This, remarkably, is the simple part. The tricky part comes when you look at mitigation. Eliminating all threats – and thus having no risk – is unachievable, as there will always exist a degree of risk. The prevailing wisdom is to determine the cost of mitigating threats against the benefits. In theory, this effort defines the amount of risk you must tolerate given what you are willing to spend. In practice, it’s proving much more challenging in the Internet era than before.
This one makes sense.
My answer is Risk also
the answer is C
Are these valid / updated for the 210-250 exam?
Potential danger = threat, so it is C.
Reply is A… Vulnerability … clear like water… A vulnerability is the weakness that makes the resource susceptible to the threat
“…could take advantage of a weakness”, not the weakness
ans is: C threat
The answer is wrong . It is not “exploit” for sure . Potential danger is “risk “.. the correct answer should be “C”.