Podcast
Questions and Answers
What are subjects in the context of security solutions?
What are subjects in the context of security solutions?
- System assets
- Entities that execute activities and request access to objects (correct)
- Logical assets
- Physical assets
Which discipline of security is primarily concerned with protecting information from unintended emanations like radio and electrical signals?
Which discipline of security is primarily concerned with protecting information from unintended emanations like radio and electrical signals?
- OPSEC
- TRANSEC
- EMSEC (correct)
- COMPUSEC
What type of assets include information, data, and intellectual property?
What type of assets include information, data, and intellectual property?
- System assets
- Adminstrative assets
- Logical assets (correct)
- Physical assets
In the context of security, what are objects?
In the context of security, what are objects?
Which category of security involves the protection of communications?
Which category of security involves the protection of communications?
What does OPSEC primarily involve protecting within an organization?
What does OPSEC primarily involve protecting within an organization?
What security domain is focused on protecting hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services?
What security domain is focused on protecting hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services?
Which security domain involves ongoing measures to reduce the likelihood of unauthorized distribution and unavailability of an organization's assets due to insiders or known outsiders?
Which security domain involves ongoing measures to reduce the likelihood of unauthorized distribution and unavailability of an organization's assets due to insiders or known outsiders?
What does IT security focus on achieving and sustaining within an IT infrastructure?
What does IT security focus on achieving and sustaining within an IT infrastructure?
Which security domain involves implementing standard operational procedures to achieve and sustain a known secure system state at all times?
Which security domain involves implementing standard operational procedures to achieve and sustain a known secure system state at all times?
According to Raggad’s taxonomy of information security, what are the five continuously interacting components of a computing environment?
According to Raggad’s taxonomy of information security, what are the five continuously interacting components of a computing environment?
Which of the following best describes the focus of personnel security in an organization?
Which of the following best describes the focus of personnel security in an organization?
Which of the following is NOT one of the six steps in the risk management procedure from Viega and McGraw?
Which of the following is NOT one of the six steps in the risk management procedure from Viega and McGraw?
What is the primary focus of computer security traditionally?
What is the primary focus of computer security traditionally?
Which term describes a weakness that allows an attacker to reduce a system's information assurance?
Which term describes a weakness that allows an attacker to reduce a system's information assurance?
What is the purpose of anti-virus software in computer security?
What is the purpose of anti-virus software in computer security?
Which security measure is specifically designed to protect against unauthorized access and cyber threats?
Which security measure is specifically designed to protect against unauthorized access and cyber threats?
What aspect of secure computing devices do cybersecurity experts refer to as 'cyber security' or 'IT security'?
What aspect of secure computing devices do cybersecurity experts refer to as 'cyber security' or 'IT security'?