Podcast
Questions and Answers
Which of the following is NOT one of the three major concerns for physical security in order of importance?
Which of the following is NOT one of the three major concerns for physical security in order of importance?
Which of the following is NOT one of the three main kinds of physical security measures?
Which of the following is NOT one of the three main kinds of physical security measures?
Why would you want to use RAID?
Why would you want to use RAID?
Which of the following is NOT a step in a typical risk management process at a high level?
Which of the following is NOT a step in a typical risk management process at a high level?
Signup and view all the answers
Why is confidentiality important in data security?
Why is confidentiality important in data security?
Signup and view all the answers
Why is authenticity a risk in data security?
Why is authenticity a risk in data security?
Signup and view all the answers
Why is assessing risks an important step in risk management?
Why is assessing risks an important step in risk management?
Signup and view all the answers
Which category of controls protects the physical environment in which systems sit or where data is stored?
Which category of controls protects the physical environment in which systems sit or where data is stored?
Signup and view all the answers
Which category of controls enables prevention of unauthorized activities?
Which category of controls enables prevention of unauthorized activities?
Signup and view all the answers
True or False: A vulnerability without a matching threat constitutes a risk.
True or False: A vulnerability without a matching threat constitutes a risk.
Signup and view all the answers
True or False: A threat without a matching vulnerability constitutes a risk.
True or False: A threat without a matching vulnerability constitutes a risk.
Signup and view all the answers
What are measures put in place to account for each threat called?
What are measures put in place to account for each threat called?
Signup and view all the answers
What are the three categories of controls mentioned in the text?
What are the three categories of controls mentioned in the text?
Signup and view all the answers
True or False: If logical controls are implemented properly and successful, an attacker or unauthorized user can still access applications and data without subverting controls.
True or False: If logical controls are implemented properly and successful, an attacker or unauthorized user can still access applications and data without subverting controls.
Signup and view all the answers
What is the term used to describe an attacker or unauthorized user accessing applications and data without subverting controls?
What is the term used to describe an attacker or unauthorized user accessing applications and data without subverting controls?
Signup and view all the answers