Fundamentals
Lecture Notes
of Information
_ Study Material
Security –
Fundamentals
Lecture Notes
of Information
_ Study Material.pdf
Security – Lecture Notes _ Study Material.pdf
● Fundamentals of Information
Security – Lecture Notes /
Study Material
Guidehttps://www.stuvia.com/dashboard!@_)#*)(@$)($@*($@)($@*_
Fundamentals of Information Security –
Fundamentals
Lecture Notes
of Information
_ Study Material.pdf
Security –
Fundamentals
Lecture Notes
of Information
_ Study Material.pdf
Security – Lecture Notes _ Study Material.pdf
,Fundamentals of Information Security Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf
Terms in this set (281)
Controls that protect the systems, networks, and Logical Controls
environments that process, transmit, and store our
data are called _______.
During what phase of the incident response process Post-Incident Activity
do we determine what happened, why it happened,
and what we can do to keep it from happening again?
Something that has the potential to cause harm to our Threat
assets is known as a(n) ________.
What is the first and arguably one of the most Identify assess
important steps of the risk management process?
The Fabrication attack type most commonly affects Integrity and Availability
which principle(s) of the CIA triad?
Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf
,Fundamentals of Information Security Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf
The Interception attack type most commonly affects Confidentiality
which principle(s) of the CIA triad?
A badge or token is considered what type of Something you have
authentication?
A password or PIN is considered what type of Something you know
authentication?
The set of methods we use to establish a claim of Authentication
identity as being true is called ______.
A fingerprint is considered what type of Something you are
authentication?
What type of authentication can prevent a man-in- Mutual
the-middle attack?
Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf
, Fundamentals of Information Security Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf
The biometric characteristic that measures how well a Permanence
factor resists change over time and with advancing
age is called __________
What dictates that we should only allow the bare Principle of least privilege
minimum of access, as needed?
Access controls are policies or procedures used to True
control access to certain items.
What is implemented through the use of access Authorization
controls?
Which answer best describes the authorization Authorization is the process of determining who is approved for access and
component of access control? what resources they are approved for.
Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf Fundamentals of Information Security.pdf