Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ____
Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
creating security policies and for communicating those policies to system users.
___________________ is responsible for creating security policies and for communicating those policies to system users.
What relates to the concept of protecting data from unauthorized users?
______________ relates to the concept of protecting data from unauthorized users.
A type of virus that resides in a Word or Excel document is called a ___________ virus?
A type of virus that resides in a Word or Excel document is called a ___________ virus?
A _________ is an information path that is not normally used for communication within a computer system. It is
A _________ is an information path that is not normally used for communication within a computer system. It is not protected by the any of the systems security mechanisms.
Total risk is defined as:
Total risk is defined as:
The amount of risk remaining after security controls have been applied is referred to as:
The amount of risk remaining after security controls have been applied is referred to as:
Identify the three steps below:
Penetration testing involves three steps. Identify the three steps below:
(Choose three)
At which step should an approve penetration test stop?
Penetration testing involves three steps. At which step should an approve penetration test stop?
The Trusted Computer Security Evaluation Criteria book (TCSEC) is also referred to as:
The Trusted Computer Security Evaluation Criteria book (TCSEC) is also referred to as:
