Podcast
Questions and Answers
Which NIST Special Publication forms the basis for FISMA and RedRamp?
Which NIST Special Publication forms the basis for FISMA and RedRamp?
What is physical security's most important concern?
What is physical security's most important concern?
What type of physical access control might you put in place to block access to a vehicle?
What type of physical access control might you put in place to block access to a vehicle?
Can you give an example of how a living organism might constitute a threat to your equipment?
Can you give an example of how a living organism might constitute a threat to your equipment?
Signup and view all the answers
Which category of physical control might include a lock?
Which category of physical control might include a lock?
Signup and view all the answers
How can embedded devices impact the physical world?
How can embedded devices impact the physical world?
Signup and view all the answers
What solutions might you use to prevent a mobile device from being jailbroken?
What solutions might you use to prevent a mobile device from being jailbroken?
Signup and view all the answers
What does the principle of authenticity refer to?
What does the principle of authenticity refer to?
Signup and view all the answers
What does the Parkerian hexad possession or control refer to?
What does the Parkerian hexad possession or control refer to?
Signup and view all the answers
What is the final leg of the CIA triad?
What is the final leg of the CIA triad?
Signup and view all the answers
Which principle of the Parkerian hexad is not necessarily binary in nature and can have a variety of degrees of utility?
Which principle of the Parkerian hexad is not necessarily binary in nature and can have a variety of degrees of utility?
Signup and view all the answers
What type of attack primarily targets the confidentiality of data?
What type of attack primarily targets the confidentiality of data?
Signup and view all the answers
What is data at rest?
What is data at rest?
Signup and view all the answers
What type of data is protected by encryption while it is in motion?
What type of data is protected by encryption while it is in motion?
Signup and view all the answers
Which type of attack involves manipulating the processes to prevent access to data, resulting in the possible loss or corruption of data?
Which type of attack involves manipulating the processes to prevent access to data, resulting in the possible loss or corruption of data?
Signup and view all the answers
What type of attack involves tampering with an asset and can be considered attacks on integrity and availability?
What type of attack involves tampering with an asset and can be considered attacks on integrity and availability?
Signup and view all the answers
In what type of attack would altering the configuration of a web server to change how it deals with encrypted connections be considered a confidentiality attack?
In what type of attack would altering the configuration of a web server to change how it deals with encrypted connections be considered a confidentiality attack?
Signup and view all the answers
How can confidentiality be compromised?
How can confidentiality be compromised?
Signup and view all the answers
What does integrity refer to?
What does integrity refer to?
Signup and view all the answers
How can utility be enforced in data?
How can utility be enforced in data?
Signup and view all the answers