Mẹo Which of the following are security controls you can use to help protect the data on your network select three quizlet?
Kinh Nghiệm Hướng dẫn Which of the following are security controls you can use to help protect the data on your network select three quizlet? 2022
Bùi Đức Thìn đang tìm kiếm từ khóa Which of the following are security controls you can use to help protect the data on your network select three quizlet? được Cập Nhật vào lúc : 2022-08-31 21:50:06 . Với phương châm chia sẻ Bí quyết về trong nội dung bài viết một cách Chi Tiết 2022. Nếu sau khi Read tài liệu vẫn ko hiểu thì hoàn toàn có thể lại Comments ở cuối bài để Tác giả lý giải và hướng dẫn lại nha.Identify the proper sequence of steps in the authentication process.
SELECT THE CORRECT ANSWER
Identification, Authentication, Authorization, Accounting
Identification, Authentication, Accounting, Authorization
Authentication, Identification, Accounting, Authorization
Authentication, Identification, Authorization, Accounting
- Which of the following are security controls you can use to help protect the data on your network select three?Which of the following provides the best protection against the loss of confidentiality for sensitive data?Which of the following is a significant difference between a patent and a trademark quizlet?When you install software you're often asked for a product key you may also be given a product ID What is the difference between a product key and a product ID?
Identify the government/military data classification
levels:
SELECT THE CORRECT ANSWER
Top secret, secret, confidential, private, public
Top secret, secret, confidential, unclassified, unclassified, public
Top secret, confidential, secret, sensitive, unclassified
Top secret, secret, confidential, sensitive but unclassified, unclassified
What are the six main categories of security controls?
SELECT THE CORRECT ANSWER
Detective, corrective, monitoring, logging, recovery, and
classification
Deterrent, preventative, detective, corrective, compensating, and recovery
Authorization, identification, factor, corrective, privilege, and detective
Identification, authentication, authorization, detective, corrective, and recovery
The primary function of a perimeter physical security is to:
SELECT THE CORRECT ANSWER
Mitigate, transfer, accept, and avoid
Deter, detect, delay, and respond
Protect, alert, initiate, and
apprehend
Prevent, compensate, audit, and recover
ACID is a set of properties of database transactions intended to guarantee reliability. What does the acronym stand for?
SELECT THE CORRECT ANSWER
Atomicity, consistency, isolation, durability
Availability, consistency, integrity, durability
Availability, confidentiality, integrity, durability
Atomicity, confidentiality, isolation, durability
What is the
key length and the block length supported by the Rijndael algorithm in AES (Advanced Encryption Standard)?
SELECT THE CORRECT ANSWER
Key length: 128, 192, 256 bits Block length: 128 bit
Key length: 128, 192, 256 bits Block length: 128, 192, 256 bits
Key length: 64, 128, 192, 256 bits Block length: 128 bit
Key length: 128, 192, 256, 512 bits Block length: 128, 192, 256, 512 bits
Security awareness, training and education can help change users'
mind-sets and behavior towards information security thereby making them a more effective security defense in an organization. Which of the following correctly describes the characteristics of a security education program?
SELECT THE CORRECT ANSWER
Attribute: why, Level: insight, Objective: understanding, impact: long-term
Attribute: how, Level: knowledge, Objective: skills, impact: intermediate
Attribute: what, Level: information, Objective: exposure, impact: short-term
Attribute:
who, Level: observation, Objective: mastery, impact: life-time
In order to make an online transaction through his bank, Bob was required to enter his correct username and password on the bank's website. He then had to enter his credit card details along with the CVV number. Finally, he received an OTP on his registered mobile number using which he was able to complete the transaction. Which authentication factors does Bob use in this scenario?
SELECT THE
CORRECT ANSWER
Something you know, something you know, something you have
Something you know, something you have, something you are
Something you know, something you have, something you have
Something you know, something you have, something you know
The IDEAL model is an organizational improvement model that serves as a roadmap for initiating, planning, and implementing improvement actions in the context of the CMMI product suite. What are the
phases in the IDEAL model?
SELECT THE CORRECT ANSWER
Initiating, diagnosing, engaging, analyzing, and learning
Initiating, designing, enabling, acting, and learning
Initiating, diagnosing, establishing, acting, and learning
Initiating, designing, establishing, analyzing, and learning
What are the prerequisites for an evidence to be admissible in the court of law?
SELECT THE CORRECT ANSWER
Real, tangible, accurate, auditable, and
believable
Relevant, authentic, accurate, complete, and convincing
Relevant, auditable, accurate, complete, and conclusive
Relevant, authentic, accurate, auditable, and believable
Firewalls can be placed in a number of areas on a network to meet particular needs. Which of the following lists the basic types of firewall architectures?
SELECT THE CORRECT ANSWER
Screening router, dual-homed gateway, screened-host gateway, and
screened-subnet
Screening router, multi-homed gateway, screened-host gateway, and bastion host
Screening router, dual-homed gateway, screened-host gateway, and DMZ
Multi-homed gateway, screened-host gateway, bastion host, and DMZ
Post a Comment