The three common core goals of security are Correct Answer-CIA :
confidentiality, integrity, and availability
Another name for safeguard is Correct Answer-countermeasure
If an attacker breaks into a corporate database and deletes critical files,
this is an attack against the ________ security goal. Correct Answer-
integrity and confidentiality
When a threat succeeds in causing harm to a business, this is a(n)
Correct Answer-breach
T/F: Most countermeasure controls are detective controls Correct
Answer-false
Which of the following are types of countermeasures? Correct Answer-
Corrective, detective, preventative
Which of the following can be a type of spyware? Correct Answer-A
cookie and a keystroke logger
T/F: The terms "intellectual property" and "trade secret" are
synonymous Correct Answer-False
, ________ are programs that attach themselves to legitimate programs.
Correct Answer-Viruses and worms
The fastest propagation occurs with some types of Correct Answer-
worms
T/F: The definition of hacking is "intentionally accessing a computer
resource without authorization or in excess of authorization." Correct
Answer-true
T/F: Confidentiality means that attackers cannot change or destroy
information. Correct Answer-False
T/F: You have access to your home page on a server. By accident, you
discover that if you hit a certain key, you can get into someone else's
files. You spend just a few minutes looking around. This is hacking.
Correct Answer-True
T/F: Detective countermeasures identify when a threat is attacking and
especially when it is succeeding. Correct Answer-True
Which of the following is a type of countermeasure? Correct Answer-
detective and corrective
________ is the destruction of hardware, software, or data. Correct
Answer-Sabotage