Term
List the Cyber Kill Chain |
|
Definition
1. Reconnaissance. 2. Weaponization. 3. Delivery. 4. Exploitation. 5. Installation 6. Command and Control 7. Actions on Objectives |
|
|
Term
Which of the choices provided ensure that only approved individuals can access special content?
a. Integrity b. Confidentiality c. Accounting d. Availability |
|
Definition
|
|
Term
Which of the choices provided ensures that information is correct and has not been altered?
a. Integrity b. Confidentiality c. Accounting d. Availability |
|
Definition
|
|
Term
Which of the choices provided ensures that information is accessible only to authorized users?
a. Integrity b. Confidentiality c. Accounting d. Availability |
|
Definition
|
|
Term
Which of the choices is NOT part of the AAA security model?
a. Authentication b. Availability c. Authorization d. Accounting |
|
Definition
|
|
Term
Forms the security around the data. May be as basic as door locks or as complicated as network security equipment. |
|
Definition
|
|
Term
Those who implement and properly use security products to protect data. |
|
Definition
|
|
Term
Plans and policies established by an organization to ensure that people correctly use the products. |
|
Definition
|
|
Term
Which of the choices provided would be considered a critical asset?
a. Information b. System Software c. Physical Items d. Services |
|
Definition
|
|
Term
Why would system software not be considered a critical asset?
a. It can be recovered from a system partition. b. It can be purchased. c. It is easily replaced. d. All of these are correct. |
|
Definition
d. All of these are correct. |
|
|