Podcast
Questions and Answers
Which access control model could you use to prevent users from logging into their accounts after business hours?
Which access control model could you use to prevent users from logging into their accounts after business hours?
- Discretionary access control
- Mandatory access control (correct)
- Role-based access control
- Attribute-based access control
What is the first law of OPSEC?
What is the first law of OPSEC?
- Always assume the worst-case scenario
- If you don't know the threat, how do you know what to protect? (correct)
- Protect classified information at all costs
- Keep your weaknesses hidden from adversaries
What is the function of the IOSS?
What is the function of the IOSS?
- Providing OPSEC awareness and training (correct)
- Developing encryption algorithms
- Conducting vulnerability assessments
- Monitoring network traffic
What is OPSEC concerned with?
What is OPSEC concerned with?
In the operations security process, what is the difference between assessing threats and assessing vulnerabilities?
In the operations security process, what is the difference between assessing threats and assessing vulnerabilities?
Why might you want to use information classification?
Why might you want to use information classification?
What is the origin of operations security?
What is the origin of operations security?
Define competitive counterintelligence.
Define competitive counterintelligence.
What type of data is COPPA concerned with?
What type of data is COPPA concerned with?
Which of the following best describes the primary goal of COPPA?
Which of the following best describes the primary goal of COPPA?
How do compliance and security relate to each other?
How do compliance and security relate to each other?
Why are industry regulations, such as PCI DSS, important?
Why are industry regulations, such as PCI DSS, important?
What are the potential impacts of being out of compliance?
What are the potential impacts of being out of compliance?
Which set of ISO standards might be useful for an information security program?
Which set of ISO standards might be useful for an information security program?
What are the three major concerns for physical security in order of importance?
What are the three major concerns for physical security in order of importance?
What are the three main kinds of physical security measures?
What are the three main kinds of physical security measures?
Why might you want to use RAID?
Why might you want to use RAID?
Can you give three examples of physical controls that work as deterrents?
Can you give three examples of physical controls that work as deterrents?
What is residual data, and why is it a concern when protecting the security of your data?
What is residual data, and why is it a concern when protecting the security of your data?