Podcast
Questions and Answers
Which of the following is NOT one of the three steps in the organizational IT security approach mentioned in the text?
Which of the following is NOT one of the three steps in the organizational IT security approach mentioned in the text?
- Integrity
- Authenticity (correct)
- Availability
- Confidentiality
Which term refers to the unauthorized disclosure of information?
Which term refers to the unauthorized disclosure of information?
- Intrusion
- Interception
- Inference
- Exposure (correct)
What type of deception involves faking identity?
What type of deception involves faking identity?
- Deception
- Repudiation
- Falsification
- Masquerade (correct)
Which term refers to the unauthorized control of a system?
Which term refers to the unauthorized control of a system?
What type of hardware security measure is used to prevent tailgating?
What type of hardware security measure is used to prevent tailgating?
Which of the following is NOT one of the three steps in the organizational IT security approach mentioned in the text?
Which of the following is NOT one of the three steps in the organizational IT security approach mentioned in the text?
What type of deception involves denying responsibility?
What type of deception involves denying responsibility?
Which term refers to the unauthorized disclosure of information by altering it?
Which term refers to the unauthorized disclosure of information by altering it?
What type of disruption impacts the availability of a system by preventing normal delivery of system services?
What type of disruption impacts the availability of a system by preventing normal delivery of system services?
What type of hardware security measure is used to prevent unauthorized access through physical barriers?
What type of hardware security measure is used to prevent unauthorized access through physical barriers?