Summary Cyber Defense and Counter measures |Verified Answers | Graded A+|
Summary Cyber Defense and Counter measures |Verified Answers | Graded A+| Summary Cyber Defense and Counter measures |Verified Answers | Graded A+| Which of the following information security elements ensures that the information is accessible only to those who are authorized to have access? A authenticity B confidentiality C integrity D availability - ANSWER - B Identify the information security element that determines trustworthiness of data or resources in terms of preventing improper and unauthorized changes. A integrity B availability C authenticity D non-repudiation - ANSWER - A John, a security professional working for Xdoc Corporation, is implementing a security strategy that uses multilayered protection throughout an information system to help minimize any adverse impact from attacks on organizational assets. Identify the security strategy John has implemented. A covert channel B defense-in-depth C likelihood analysis D three-way handshake - ANSWER - B Identify the security policy that doesn't keep any restrictions on the usage of system resources. A promiscuous policy B prudent policy C paranoid policy D permissive policy - ANSWER - A Carl is trying to violate the acceptable use of a network and computer use policy. Under which category of the incident handling criteria does this scenario fall? A CAT 4 B CAT 2 C CAT 1 D CAT 3 - ANSWER - A
Geschreven voor
- Instelling
- CBS - CyberSAFE
- Vak
- CBS - CyberSAFE
Documentinformatie
- Geüpload op
- 16 augustus 2023
- Aantal pagina's
- 21
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
verified answers
-
graded a
-
cbs cybersafe
-
c842 study guide 2023
-
summary cyber defense and counter measures
-
c842 cyber defense and counter measures