International Information Security Challenges & Cyber Laws Quiz

LucrativeMagenta avatar
LucrativeMagenta
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

Which NIST Special Publication forms the basis for FISMA and RedRamp?

NIST SP 800-53

What is physical security's most important concern?

Protecting people

What type of physical access control might you put in place to block access to a vehicle?

Security landscaping

Can you give an example of how a living organism might constitute a threat to your equipment?

<p>Insects and small animals could cause electrical shorts</p> Signup and view all the answers

Which category of physical control might include a lock?

<p>Preventative security</p> Signup and view all the answers

How can embedded devices impact the physical world?

<p>They can control industrial processes</p> Signup and view all the answers

What solutions might you use to prevent a mobile device from being jailbroken?

<p>Performing OS updates when they are available</p> Signup and view all the answers

What does the principle of authenticity refer to?

<p>The proper attribution of data to its owner or creator</p> Signup and view all the answers

What does the Parkerian hexad possession or control refer to?

<p>The physical disposition of data storage media</p> Signup and view all the answers

What is the final leg of the CIA triad?

<p>Availability</p> Signup and view all the answers

Which principle of the Parkerian hexad is not necessarily binary in nature and can have a variety of degrees of utility?

<p>Utility</p> Signup and view all the answers

What type of attack primarily targets the confidentiality of data?

<p>Interception</p> Signup and view all the answers

What is data at rest?

<p>Data that is stored and not being moved</p> Signup and view all the answers

What type of data is protected by encryption while it is in motion?

<p>Data in motion</p> Signup and view all the answers

Which type of attack involves manipulating the processes to prevent access to data, resulting in the possible loss or corruption of data?

<p>Interruption attack</p> Signup and view all the answers

What type of attack involves tampering with an asset and can be considered attacks on integrity and availability?

<p>Modification attack</p> Signup and view all the answers

In what type of attack would altering the configuration of a web server to change how it deals with encrypted connections be considered a confidentiality attack?

<p>Modification attack</p> Signup and view all the answers

How can confidentiality be compromised?

<p>All of the above</p> Signup and view all the answers

What does integrity refer to?

<p>The ability to prevent unauthorized changes to data</p> Signup and view all the answers

How can utility be enforced in data?

<p>Using digital signatures</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser