Podcast
Questions and Answers
Which of the following is NOT considered an asset in computer security?
Which of the following is NOT considered an asset in computer security?
- Data
- Hardware
- Network gear (correct)
- Software
What is the C-I-A Triad?
What is the C-I-A Triad?
- A type of computer virus
- A group of hackers
- A set of computer security objectives (correct)
- A security control framework
What does access control terminology refer to?
What does access control terminology refer to?
- The regulation of computer software
- The practice of securing computer networks
- The process of protecting computer assets (correct)
- The management of computer hardware
What do basic threats, vulnerabilities, and attacks relate to?
What do basic threats, vulnerabilities, and attacks relate to?
What do controls map to in computer security?
What do controls map to in computer security?
Which one of these is NOT considered an asset in computer security?
Which one of these is NOT considered an asset in computer security?
What is the main objective of computer security?
What is the main objective of computer security?
What does the C-I-A Triad stand for in computer security?
What does the C-I-A Triad stand for in computer security?
What is access control terminology related to in computer security?
What is access control terminology related to in computer security?
What do basic threats, vulnerabilities, and attacks relate to in computer security?
What do basic threats, vulnerabilities, and attacks relate to in computer security?