Podcast
Questions and Answers
What are the five factors contributing to the increasing vulnerability of information resources?
What are the five factors contributing to the increasing vulnerability of information resources?
- Hardware failures, software bugs, system crashes, power outages, and network failures
- Human errors, social engineering, technological advancements, lack of security policies, and globalization (correct)
- Unauthorized access, system disruption, modification, destruction, and disclosure
- Malware, phishing, data breaches, insider threats, and natural disasters
What is an example of a deliberate software attack?
What is an example of a deliberate software attack?
- Hardware malfunction
- Power outage
- Network congestion
- Denial of Service (DoS) (correct)
What are the three major types of controls that organizations can use to protect their information resources?
What are the three major types of controls that organizations can use to protect their information resources?
- Intrusion detection systems, biometric authentication, and access control lists
- Firewalls, antivirus software, and encryption
- Backup systems, disaster recovery plans, and redundant hardware
- Physical controls, technical controls, and administrative controls (correct)
What does information security refer to?
What does information security refer to?
What is an example of a threat to an information resource?
What is an example of a threat to an information resource?