International Information Security Challenges & Cyber Laws Quiz
20 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which NIST Special Publication forms the basis for FISMA and RedRamp?

  • NIST SP 800-53 (correct)
  • NIST SP 800-39
  • NIST SP 800-37
  • NIST SP 800-30

What is physical security's most important concern?

  • Ensuring availability
  • Protecting people (correct)
  • Protecting data
  • Preventing unauthorized access

What type of physical access control might you put in place to block access to a vehicle?

  • Visitor badges
  • Biometric authentication
  • Surveillance cameras
  • Security landscaping (correct)

Can you give an example of how a living organism might constitute a threat to your equipment?

<p>Insects and small animals could cause electrical shorts (D)</p> Signup and view all the answers

Which category of physical control might include a lock?

<p>Preventative security (A)</p> Signup and view all the answers

How can embedded devices impact the physical world?

<p>They can control industrial processes (B)</p> Signup and view all the answers

What solutions might you use to prevent a mobile device from being jailbroken?

<p>Performing OS updates when they are available (A)</p> Signup and view all the answers

What does the principle of authenticity refer to?

<p>The proper attribution of data to its owner or creator (A)</p> Signup and view all the answers

What does the Parkerian hexad possession or control refer to?

<p>The physical disposition of data storage media (D)</p> Signup and view all the answers

What is the final leg of the CIA triad?

<p>Availability (D)</p> Signup and view all the answers

Which principle of the Parkerian hexad is not necessarily binary in nature and can have a variety of degrees of utility?

<p>Utility (B)</p> Signup and view all the answers

What type of attack primarily targets the confidentiality of data?

<p>Interception (D)</p> Signup and view all the answers

What is data at rest?

<p>Data that is stored and not being moved (D)</p> Signup and view all the answers

What type of data is protected by encryption while it is in motion?

<p>Data in motion (C)</p> Signup and view all the answers

Which type of attack involves manipulating the processes to prevent access to data, resulting in the possible loss or corruption of data?

<p>Interruption attack (C)</p> Signup and view all the answers

What type of attack involves tampering with an asset and can be considered attacks on integrity and availability?

<p>Modification attack (D)</p> Signup and view all the answers

In what type of attack would altering the configuration of a web server to change how it deals with encrypted connections be considered a confidentiality attack?

<p>Modification attack (D)</p> Signup and view all the answers

How can confidentiality be compromised?

<p>All of the above (D)</p> Signup and view all the answers

What does integrity refer to?

<p>The ability to prevent unauthorized changes to data (B)</p> Signup and view all the answers

How can utility be enforced in data?

<p>Using digital signatures (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser