Podcast
Questions and Answers
Which one of the following best describes possession or control in the context of the Parkerian Hexad?
Which one of the following best describes possession or control in the context of the Parkerian Hexad?
- The unauthorized access of data, applications, or environments
- The usefulness of data to the user
- The ability to attribute data to the proper owner or creator
- The physical disposition of the media on which the data is stored (correct)
What is the primary focus of interceptions in the context of attacks?
What is the primary focus of interceptions in the context of attacks?
- Confidentiality (correct)
- Availability
- Integrity
- Utility
What is the main purpose of fabrication attacks?
What is the main purpose of fabrication attacks?
- Generating fake information in a database (correct)
- Tampering with an asset
- Making assets temporarily or permanently unusable
- Moving data from one place to another
Which category of controls protects the physical environment in which systems and data are stored?
Which category of controls protects the physical environment in which systems and data are stored?
Which step in the risk management process involves assessing vulnerabilities in the context of potential threats?
Which step in the risk management process involves assessing vulnerabilities in the context of potential threats?
Which term describes the conjunction of a threat and a vulnerability?
Which term describes the conjunction of a threat and a vulnerability?
What is the first and arguably most important part of the risk management process?
What is the first and arguably most important part of the risk management process?
Which term refers to the physical disposition of the media on which the data is stored?
Which term refers to the physical disposition of the media on which the data is stored?
What is the primary focus of interceptions in the context of attacks?
What is the primary focus of interceptions in the context of attacks?
What is the main purpose of fabrication attacks?
What is the main purpose of fabrication attacks?
Which category of controls protects the systems, networks, and environments that process, transmit, and store data?
Which category of controls protects the systems, networks, and environments that process, transmit, and store data?
What is the purpose of identifying assets in the risk management process?
What is the purpose of identifying assets in the risk management process?
What is the conjunction of a threat and a vulnerability called?
What is the conjunction of a threat and a vulnerability called?
Which framework is often useful for discussing the nature of a given threat in the risk management process?
Which framework is often useful for discussing the nature of a given threat in the risk management process?
Flashcards are hidden until you start studying