Quiz 1 Flashcards
Someone (a person or a system) is authorized to perform one or more actions on a digital asset.
Controlled Access
This is when sensitive data are in an exposed, uncontrolled condition.
Incomplete Mediation
For an attack to be executed, attackers need MOM. Select which represents MOM.
Method
Opportunity
Motive
It is a weakness in a security system.
Vulnerability
Following are Software Level of Vulnerabilities / Threats except.
Deletion
Modification
Theft
Connection
Connection
These are means and ways to block a threat, which tries to exploit one or more vulnerabilities.
Controls
A kind of attack characterized when an unauthorized party (human or not) gains access to an asset.
Interception
This involves the use of a physical or biological characteristic of a human body to authenticate a user.
Biometrics
A kind of threat in which an asset becomes lost, unavailable, or unusable.
Interruption
A type of attack that involves trying every possible combination of characters until the correct password is found.
Dictionary Attack.
Which of the following is not an example of Inadvertent Program Flaw.
Sufficient identification and authentication mechanism.
Which of the following is not a control category in a physical security program?
Delaying and lighting
The act of pretending to be another person (or entity) for the purpose of entertainment or fraud of entertainment or fraud.
Impersonation
Choose which among the following is/are type/s of Attacks on Data CIA.
Disclosure
Unauthorized modification/deception
Disruption
Usurpation
The following are the Basic Components of Security except.
Secrecy
Which of the following is the best choice in choosing security guard for a physical access control mechanism?
When discriminating judgement is required.
Which of the following problems are caused by humidity on electrical devices?
High humidity causes power fluctuations whereas low humidity causes static electricity.
Circumstances that have a potential to cause harm in a system.
Threat
Which of the following means an access control has a fail-safe characteristic but not a fail-secure characteristic?
It defaults to being locked.
The use of people skills to obtain information from employees that should not be released.
Social Engineering
What will be your first reaction to an exploit. Select the best answer.
Report it immediately.
Under Data Privacy Act, which of the following is not part of the rights of a Data Subject.
Right to allow fraud.
Which of the following steps should taken initially when a fire has been detected?
Turn of the fire suppression system
The following are the Basic Components of Security except.
Secrecy
What is a mantrap?
A double-door room used for physical access control.
A set of systematic techniques designed to reveal hazardous system states.
Hazard Analysis
A type of test that ensures a system generates correct output values in light of known input values does not consider the internal workings of the system.
Black Box