Podcast
Questions and Answers
Which type of attack utilizes credible scenarios to lure people into disclosing sensitive information?
Which type of attack utilizes credible scenarios to lure people into disclosing sensitive information?
- Denial of Service
- Malware
- Phishing
- Pretexting (correct)
Which security vulnerability does security awareness training help reduce?
Which security vulnerability does security awareness training help reduce?
- Password misuses (correct)
- Malware infections
- Unauthorized access
- Data breaches
Which part of a security awareness program locks down sensitive information before exiting?
Which part of a security awareness program locks down sensitive information before exiting?
- Data encryption policy
- Clean desk policy (correct)
- Incident response policy
- Access control policy
What is a major category of physical threats?
What is a major category of physical threats?
Which type of asset control reports undesirable events?
Which type of asset control reports undesirable events?
What are two considerations when choosing a location for a data center?
What are two considerations when choosing a location for a data center?
What is a protocol for securing communications?
What is a protocol for securing communications?
What is the purpose of Wireshark?
What is the purpose of Wireshark?
What are two advantages of using VPNs (Virtual Private Networks)?
What are two advantages of using VPNs (Virtual Private Networks)?
Which type of intrusion detection system (IDS) compares the present state of traffic to a baseline measurement of normal data to detect unusual traffic patterns?
Which type of intrusion detection system (IDS) compares the present state of traffic to a baseline measurement of normal data to detect unusual traffic patterns?
Which law of operations security emphasizes the importance of identifying critical information?
Which law of operations security emphasizes the importance of identifying critical information?
Competitive counterintelligence refers to the practice of managing intelligence-gathering activities directed at which entity?
Competitive counterintelligence refers to the practice of managing intelligence-gathering activities directed at which entity?
Which term is used to describe the sensitive data or assets on which a company is based and everything else depends?
Which term is used to describe the sensitive data or assets on which a company is based and everything else depends?
In the operations security process, which two steps are included?
In the operations security process, which two steps are included?
What does risk assessment determine in the operations security process?
What does risk assessment determine in the operations security process?
What is metadata?
What is metadata?
What is the first law of operations security?
What is the first law of operations security?
What does competitive intelligence involve?
What does competitive intelligence involve?
What is the purpose of competitive counterintelligence?
What is the purpose of competitive counterintelligence?
What is the role of critical information in an organization?
What is the role of critical information in an organization?