CISA Certified Information Systems Auditor – Question2796

A poor choice of passwords and transmission over unprotected communications lines are examples of:

A.
vulnerabilities.
B. threats.
C. probabilities.
D. impacts.

Correct Answer: A

Explanation:

Explanation:
Vulnerabilities represent characteristics of information resources that may be exploited by a threat. Threats are circumstances or events with the potential to cause harm to information resources. Probabilities represent the likelihood of the occurrence of a threat, while impacts represent the outcome or result of a threat exploiting a vulnerability.