1. Which home of data reliability assures that only authorized users can modify data? a. Availableness
2 . Which usually property of data would a successful denial-of-service (DoS) attack most affect? a. Availability
several. Which of the following is a stand-alone destructive software program that actively transfers itself, generally over sites, to invade other computers? a. Disease
b. Trojan horse
some. Which description below greatest describes an actual control? a. A device that limits get or otherwise defends a resource, such as a fence, door, lock, or perhaps fire extinguisher. b. A control that repairs the consequences of damage from an assault. c. A tool or procedure that restrictions access to one. Examples include user authentication, malware software, and firewalls. d. A administration action, crafted policy, process, guideline, regulation, law, or perhaps rule of any kind.
your five. Which term means any kind of exposure to a threat?
6. Which term means the gathering of all possible vulnerabilities that may provide unauthorized access to computer resources? a. Vulnerability universe
b. Risk exposure
c. Threat model
d. Harm surface
six. Which with the following conditions mean the act of granting and denying access to resources based on the verified user? a. Identification
almost eight. Which with the following terms is an access control method depending on the subject's clearance and the object's classification? a. Discretionary Access Control (DAC)
b. Mandatory Get Control (MAC)
c. Position Based Get Control (RBAC)
d. Series Driver Access Control (LDAC)
9. Which type of authentication is based on a physical object made up of identity information, such as a expression, card, or perhaps other system? a. Type IV
b. Type 3
c. Type II
g. Type I
10. Which of the...