Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
Security incidents fall into a number of categories such as accidental, deliberate, and ____________.
creating security policies and for communicating those policies to system users.
___________________ is responsible for creating security policies and for communicating those policies to system users.
What relates to the concept of protecting data from unauthorized users?
______________ relates to the concept of protecting data from unauthorized users.
A type of virus that resides in a Word or Excel document is called a ___________ virus?
A type of virus that resides in a Word or Excel document is called a ___________ virus?
A _________ is an information path that is not normally used for communication within a computer system. It is
A _________ is an information path that is not normally used for communication within a computer system. It is not protected by the any of the systems security mechanisms.
Total risk is defined as:
Total risk is defined as:
The amount of risk remaining after security controls have been applied is referred to as:
The amount of risk remaining after security controls have been applied is referred to as:
Identify the three steps below:
Penetration testing involves three steps. Identify the three steps below:
(Choose three)
At which step should an approve penetration test stop?
Penetration testing involves three steps. At which step should an approve penetration test stop?
The Trusted Computer Security Evaluation Criteria book (TCSEC) is also referred to as:
The Trusted Computer Security Evaluation Criteria book (TCSEC) is also referred to as: