The three fundamental principles of security are:
The three fundamental principles of security are:
What does the letter A stand for in the CIA triad?
What does the letter A stand for in the CIA triad?
What would you call an absence or weakness in a system that could possibly be exploited?
What would you call an absence or weakness in a system that could possibly be exploited?
Add-on security can be defined as:
Add-on security can be defined as:
which is not a technical control?
Of the following, which is not a technical control?
what security measures should be implemented?
Who should make decisions about how a company should approach security and what security measures should be implemented?
Which department would be best suited for this task?
Samantha wants one of her department managers to oversee the development of a company information security policy. Which department would be best suited for this task?
what is the opposite of confidentiality?
In terms of information security, what is the opposite of confidentiality?
An activity that has the potential to cause harm to information systems or networks is called a:
An activity that has the potential to cause harm to information systems or networks is called a:
Knowing that the data message you received is the data message that was sent is an example of:
Knowing that the data message you received is the data message that was sent is an example of: