6) An information resource’s vulnerability is _____. a) any danger to an information resource b) the potential loss or damage to an information resource c) the possibility that the system will be harmed by a threat d) the processes designed to protect an organization’s information systems 7) Which of the following factors contributes to the increasing vulnerability of organizational information resources? a) Today’s interconnected, interdependent, wirelessly networked business environment b) Smaller, faster, cheaper computers and storage devices c) Decreasing skills necessary to be a computer hacker d) All of these options 8) The lower the level of employee, the greater the threat he or she poses to information security. 9) Which of the following employees typically pose the most significant threat to information security? a) Janitors b) Contract labor c) Consultants d) Human resources employees 10) Unintentional threats to information systems include all of the following except: a) discarding old computer hardware without completely wiping the memory. b) choosing and using strong passwords. c) accidentally losing or misplacing a company’s laptop. d) opening e-mails from someone unknown. Â