O'Reilly logo

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition, 4th Edition by Adam Gordon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image

Appendix A

Answers to Domain Review Questions

Domain 1 – Security and Risk Management

  1. Within the realm of IT security, which of the following combinations best defines risk?
    1. Threat coupled with a breach
    2. Threat coupled with a vulnerability
    3. Vulnerability coupled with an attack
    4. Threat coupled with a breach of security

Answer: B

A vulnerability is a lack of a countermeasure or a weakness in a countermeasure that is in place. A threat is any potential danger that is associated with the exploitation of a vulnerability. The threat is that someone, or something, will identify a specific vulnerability and use it against the company or individual. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required