Podcast
Questions and Answers
Which of the following is NOT considered an asset in computer security?
Which of the following is NOT considered an asset in computer security?
What is the C-I-A Triad?
What is the C-I-A Triad?
What does access control terminology refer to?
What does access control terminology refer to?
What do basic threats, vulnerabilities, and attacks relate to?
What do basic threats, vulnerabilities, and attacks relate to?
Signup and view all the answers
What do controls map to in computer security?
What do controls map to in computer security?
Signup and view all the answers
Which one of these is NOT considered an asset in computer security?
Which one of these is NOT considered an asset in computer security?
Signup and view all the answers
What is the main objective of computer security?
What is the main objective of computer security?
Signup and view all the answers
What does the C-I-A Triad stand for in computer security?
What does the C-I-A Triad stand for in computer security?
Signup and view all the answers
What is access control terminology related to in computer security?
What is access control terminology related to in computer security?
Signup and view all the answers
What do basic threats, vulnerabilities, and attacks relate to in computer security?
What do basic threats, vulnerabilities, and attacks relate to in computer security?
Signup and view all the answers