International Information Security Challenges & Cyber Laws Quiz
20 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which NIST Special Publication forms the basis for FISMA and RedRamp?

  • NIST SP 800-53 (correct)
  • NIST SP 800-39
  • NIST SP 800-37
  • NIST SP 800-30
  • What is physical security's most important concern?

  • Ensuring availability
  • Protecting people (correct)
  • Protecting data
  • Preventing unauthorized access
  • What type of physical access control might you put in place to block access to a vehicle?

  • Visitor badges
  • Biometric authentication
  • Surveillance cameras
  • Security landscaping (correct)
  • Can you give an example of how a living organism might constitute a threat to your equipment?

    <p>Insects and small animals could cause electrical shorts (D)</p> Signup and view all the answers

    Which category of physical control might include a lock?

    <p>Preventative security (A)</p> Signup and view all the answers

    How can embedded devices impact the physical world?

    <p>They can control industrial processes (B)</p> Signup and view all the answers

    What solutions might you use to prevent a mobile device from being jailbroken?

    <p>Performing OS updates when they are available (A)</p> Signup and view all the answers

    What does the principle of authenticity refer to?

    <p>The proper attribution of data to its owner or creator (A)</p> Signup and view all the answers

    What does the Parkerian hexad possession or control refer to?

    <p>The physical disposition of data storage media (D)</p> Signup and view all the answers

    What is the final leg of the CIA triad?

    <p>Availability (D)</p> Signup and view all the answers

    Which principle of the Parkerian hexad is not necessarily binary in nature and can have a variety of degrees of utility?

    <p>Utility (B)</p> Signup and view all the answers

    What type of attack primarily targets the confidentiality of data?

    <p>Interception (D)</p> Signup and view all the answers

    What is data at rest?

    <p>Data that is stored and not being moved (D)</p> Signup and view all the answers

    What type of data is protected by encryption while it is in motion?

    <p>Data in motion (C)</p> Signup and view all the answers

    Which type of attack involves manipulating the processes to prevent access to data, resulting in the possible loss or corruption of data?

    <p>Interruption attack (C)</p> Signup and view all the answers

    What type of attack involves tampering with an asset and can be considered attacks on integrity and availability?

    <p>Modification attack (D)</p> Signup and view all the answers

    In what type of attack would altering the configuration of a web server to change how it deals with encrypted connections be considered a confidentiality attack?

    <p>Modification attack (D)</p> Signup and view all the answers

    How can confidentiality be compromised?

    <p>All of the above (D)</p> Signup and view all the answers

    What does integrity refer to?

    <p>The ability to prevent unauthorized changes to data (B)</p> Signup and view all the answers

    How can utility be enforced in data?

    <p>Using digital signatures (A)</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser