Professional Documents
Culture Documents
5. The three types of security controls that are necessary to secure a networ
k or system are:
A) people, functions, and technology.
Feedback: Page 29
B) people, process, and technology.
C) technology,roles, and separation of duties.
D) separation of duties, processes, and people.
Feedback: Page 29Points Earned: 0.0/8.0
Correct Answer(s): B
6. A cookbook on how to take advantage of a vulnerability is called a(n):
A) risk.
B) program.
C) exploit.
Feedback: Page 29
D) threat.
Feedback: Page 29Points Earned: 8.0/8.0
Correct Answer(s): C
8. Making sure that data hasn't been changed unintentionally due to accident
or malice is:
A) availability
B) auditability
Feedback: Page 22
C) integrity
D) confidentially
Feedback: Page 22Points Earned: 0.0/8.0
Correct Answer(s): C
10. Defense in Depth is needed to assure that which three mandatory activitie
s are present in a security system?
A) prevention, response, and management
B) prevention, detection, and response
Feedback: Page 23
C) response, collection of evidence, and prosecution
D) prevention, response, and prosecution
Feedback: Page 23Points Earned: 8.0/8.0
Correct Answer(s): B