This study source was downloaded by 100000859819779 from CourseHero.com on 02-05-2023 13:38:56 GMT -06:00https://www.coursehero.com/file/180349580/CYB-240-5-2-reading-quizdocx/ Attempt 2Written: Nov 25, 2022 9:37 AM - Nov 25, 2022 9:48 AMSubmission ViewYour quiz has been submitted successfully.2.5 / 2.5 pointsWhich of the following NIST publications focuses mainly on IT security?Question options:Which of the following government regulations does not concern itself with privacy as its main focus?Question options:Sarbanes-Oxley Act (SOX)Health Insurance Portability and Accountability Act (HIPAA)Personal Information Protection and Electronic Documents Act (PIPEDA)California Security Breach Information Act (SB-1386)Which of the following is the term for any security vulnerability found during an audit that impinges upon a compliance standard?Question options:Computer virusThis study source was downloaded by 100000859819779 from CourseHero.com on 02-05-2023 13:38:56 GMT -06:00https://www.coursehero.com/file/180349580/CYB-240-5-2-reading-quizdocx/Compliance violationSoftware violationWhich of the following is a worldwide not-for-profit organization focused on improving web application security?Question options:Which of the following consists of a comprehensive list of the IT security control points?Question options:Which of the following is not a category of database issues?Question options:Privilege escalationsNetwork communicationsThis study source was downloaded by 100000859819779 from CourseHero.com on 02-05-2023 13:38:56 GMT -06:00https://www.coursehero.com/file/180349580/CYB-240-5-2-reading-quizdocx/Arbitrary code executionsProtocol issuesYou can use which of the following along with web application analysis tools in order to locate vulnerabilities?Question options:Active directory monitoring toolsPacket