International Information Security Challenges & Cyber Laws Quiz
20 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which NIST Special Publication forms the basis for FISMA and RedRamp?

  • NIST SP 800-53 (correct)
  • NIST SP 800-39
  • NIST SP 800-37
  • NIST SP 800-30
  • What is physical security's most important concern?

  • Ensuring availability
  • Protecting people (correct)
  • Protecting data
  • Preventing unauthorized access
  • What type of physical access control might you put in place to block access to a vehicle?

  • Visitor badges
  • Biometric authentication
  • Surveillance cameras
  • Security landscaping (correct)
  • Can you give an example of how a living organism might constitute a threat to your equipment?

    <p>Insects and small animals could cause electrical shorts</p> Signup and view all the answers

    Which category of physical control might include a lock?

    <p>Preventative security</p> Signup and view all the answers

    How can embedded devices impact the physical world?

    <p>They can control industrial processes</p> Signup and view all the answers

    What solutions might you use to prevent a mobile device from being jailbroken?

    <p>Performing OS updates when they are available</p> Signup and view all the answers

    What does the principle of authenticity refer to?

    <p>The proper attribution of data to its owner or creator</p> Signup and view all the answers

    What does the Parkerian hexad possession or control refer to?

    <p>The physical disposition of data storage media</p> Signup and view all the answers

    What is the final leg of the CIA triad?

    <p>Availability</p> Signup and view all the answers

    Which principle of the Parkerian hexad is not necessarily binary in nature and can have a variety of degrees of utility?

    <p>Utility</p> Signup and view all the answers

    What type of attack primarily targets the confidentiality of data?

    <p>Interception</p> Signup and view all the answers

    What is data at rest?

    <p>Data that is stored and not being moved</p> Signup and view all the answers

    What type of data is protected by encryption while it is in motion?

    <p>Data in motion</p> Signup and view all the answers

    Which type of attack involves manipulating the processes to prevent access to data, resulting in the possible loss or corruption of data?

    <p>Interruption attack</p> Signup and view all the answers

    What type of attack involves tampering with an asset and can be considered attacks on integrity and availability?

    <p>Modification attack</p> Signup and view all the answers

    In what type of attack would altering the configuration of a web server to change how it deals with encrypted connections be considered a confidentiality attack?

    <p>Modification attack</p> Signup and view all the answers

    How can confidentiality be compromised?

    <p>All of the above</p> Signup and view all the answers

    What does integrity refer to?

    <p>The ability to prevent unauthorized changes to data</p> Signup and view all the answers

    How can utility be enforced in data?

    <p>Using digital signatures</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser