Podcast
Questions and Answers
What is the main difference between a directed attack and other types of attacks?
What is the main difference between a directed attack and other types of attacks?
- Directed attacks targets multiple organizations.
- Directed attacks targets random individuals or organizations.
- Directed attacks targets a specific individual.
- Directed attacks targets a specific organization. (correct)
What type of threat violates the confidentiality security concept?
What type of threat violates the confidentiality security concept?
- Modification
- Interception (correct)
- Fabrication
- Interruption
What is an example of an interruption threat?
What is an example of an interruption threat?
- Malicious destruction of a hardware device. (correct)
- Creating a counterfeit object on a computing system.
- Illicit copying of program or data files.
- Changing the values in a database.
What type of threat involves unauthorized creation of counterfeit objects on a computing system?
What type of threat involves unauthorized creation of counterfeit objects on a computing system?
What type of threat involves unauthorized access and tampering with an asset?
What type of threat involves unauthorized access and tampering with an asset?
What is the term for unauthorized access to an asset?
What is the term for unauthorized access to an asset?
What is computer security primarily concerned with?
What is computer security primarily concerned with?
What is confidentiality in the context of computer security?
What is confidentiality in the context of computer security?
What is the primary goal of integrity in computer security?
What is the primary goal of integrity in computer security?
What is the opposite of availability in computer security?
What is the opposite of availability in computer security?
What determines the value of an asset in computer security?
What determines the value of an asset in computer security?
What is a necessary condition for an object or service to be considered available?
What is a necessary condition for an object or service to be considered available?
How many important aspects of computer security are there?
How many important aspects of computer security are there?
What is a vulnerability in the context of computer security?
What is a vulnerability in the context of computer security?
What is the negative consequence of an actualized threat?
What is the negative consequence of an actualized threat?
What is an attack in the context of computer security?
What is an attack in the context of computer security?
What is the primary purpose of a control in computer security?
What is the primary purpose of a control in computer security?
What is the relationship between a threat and a vulnerability?
What is the relationship between a threat and a vulnerability?
What type of program controls enforce security restrictions within a program?
What type of program controls enforce security restrictions within a program?
What is the primary function of independent control programs?
What is the primary function of independent control programs?
What type of hardware device verifies users' identities?
What type of hardware device verifies users' identities?
What type of controls enforce procedures or policies among users?
What type of controls enforce procedures or policies among users?
What is the primary goal of development controls?
What is the primary goal of development controls?
What type of control limits access to a program's features?
What type of control limits access to a program's features?
What is a Trojan horse in the context of software modification?
What is a Trojan horse in the context of software modification?
What is the primary concern of software security?
What is the primary concern of software security?
What is the result when a threat is realized against a vulnerability?
What is the result when a threat is realized against a vulnerability?
What is an example of a data vulnerability?
What is an example of a data vulnerability?
What is the primary concern of data integrity?
What is the primary concern of data integrity?
What is the goal of software authors and distributors regarding software use?
What is the goal of software authors and distributors regarding software use?
Flashcards are hidden until you start studying