ISACA Exam Questions

A poor choice of passwords and transmission over unprotected communications lines are examples of:

A poor choice of passwords and transmission over unprotected communications lines are examples of:

A.
vulnerabilities.

B.
threats.

C.
probabilities.

D.
impacts.

Explanation:
Vulnerabilities represent characteristics of information resources that may be exploited by a threat. Threats are circumstances or events with the potential to cause harm to information resources. Probabilities represent the likelihood of the occurrence of a threat, while impacts represent the outcome or result of a threat exploiting a vulnerability.