What is a threat in the context of InfoSec? What are the 12 categories of threats presented?
What is the difference between a threat and an attack? How can a vulnerability be converted into an attack?
What name is given to an attack that makes use of viruses and worms? What name is given to an attack that does not actually cause damage other than wasted time and resources?