Question
1) Perhaps the leading example of risk management applied to information security is; a. All of tthese b. ISO/IEC 27001 c. NIST d. IOC 2)
1) Perhaps the leading example of risk management applied to information security is;
a. All of tthese
b. ISO/IEC 27001
c. NIST
d. IOC
2) With our connected world the most pressing concern of corporations in regard to Information Security is protecting their:
a. Web Servers
b. Tangible Assets
c. Stock Options
d. Intangible Assets
3) CIA Triad matching questions. Match the scenario on the left with the correct CIA term on the right.
- Data Breach leaked the Social Security Numbers of 10 Million customers.
-Users experienced timeouts and slow response time when checking out of the online shopping cart
-A SQL Injection attack dropped several tables from the database
Answer choices for question 3: candidness, authenticity, instability,integrity, confidentiality, authorization, availability
4)Match the description on the Left with the proper method of addressing vulnerabilities and Threats.
-Restoring Data from backups
-Monitoring Intrusion Detection Systems
-Applying Security Patches
Answer choices for question 4: Recover, prevent, operations, detect, governance
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started