6 Questions
What are excellent online resources mentioned in the text for mapping out potential attack vectors and vulnerabilities?
Mitre Att&ck & CVE
Which of the following is NOT an example of an online resource mentioned in the text for risk assessment?
ISO/IEC 27001:2013
In which chapter of the CISSP Study Guide would one likely find information related to risk assessment?
Chapter 8
Which ISO standard is specifically related to Information Security Risk Management?
ISO/IEC 27005:2011
What is the purpose of mapping out potential attack vectors and vulnerabilities in the context of risk assessment?
To prioritize risks for mitigation
Which of the following resources is related to information security controls for cyber defense?
NIST Special Publication 800-30
Test your knowledge on the principles and concepts of information security based on ISO/IEC 27005:2011. Questions include topics such as the CIA Triad, confidentiality, integrity, availability, authentication, authorization, nonrepudiation, audit, and accountability.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free