Lecture 3-2 Flashcards

1
Q

Fill in the blank: A _______ is a series of detailed steps to be followed for accomplishing a particular task.

A

procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of user permissions in the CIA Triad?

A

They uphold Confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an example of a technical control?

A

Firewalls or anti-virus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What outcome is achieved by implementing security controls?

A

Security function outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the term ‘asset discovery’ refer to?

A

Identifying the owned assets within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank: A standard can be used as a _______ document for implementing a policy.

A

reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name one regulatory framework that applies to personal data in Canada.

A

PIPEDA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name this: Examples include strong password recommendations and OS hardening.

A

Security Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly