Podcast
Questions and Answers
What is the main purpose of disaster recovery?
What is the main purpose of disaster recovery?
- Ensuring authorized users have timely and reliable access to information and systems
- Maintaining essential business functions through redundancy and contingency plans
- Planning and procedures for restoring operations after a major outage or disruption (correct)
- Identifying, analyzing, and evaluating potential security risks
Which of the following is a detective control?
Which of the following is a detective control?
- Access controls
- Encryption
- Intrusion detection systems (correct)
- Firewalls
What is the purpose of vulnerability scanning?
What is the purpose of vulnerability scanning?
- Protecting data confidentiality by transforming it into an unreadable format
- Ensuring authorized users have timely and reliable access to information and systems
- Having a plan to identify, contain, and recover from security incidents
- Identifying and addressing weaknesses in systems before they can be exploited (correct)
What does risk assessment involve?
What does risk assessment involve?
What is the role of policy enforcement?
What is the role of policy enforcement?
What is defined as protection against harm, unauthorized access, or loss of valuable assets?
What is defined as protection against harm, unauthorized access, or loss of valuable assets?
Which of the following represents weaknesses in systems, processes, or practices that can be exploited by threats?
Which of the following represents weaknesses in systems, processes, or practices that can be exploited by threats?
What technology transforms data into an unreadable format to ensure confidentiality?
What technology transforms data into an unreadable format to ensure confidentiality?
Which of the following represents potential actors or events that can exploit vulnerabilities and cause harm?
Which of the following represents potential actors or events that can exploit vulnerabilities and cause harm?
What category of vulnerabilities includes unsecured Wi-Fi, open ports, weak passwords, and configuration errors?
What category of vulnerabilities includes unsecured Wi-Fi, open ports, weak passwords, and configuration errors?
Flashcards are hidden until you start studying