Quiz 1 Flashcards
Someone (a person or a system) is authorized to perform one or more actions on a digital asset.
Controlled Access
This is when sensitive data are in an exposed, uncontrolled condition.
Incomplete Mediation
For an attack to be executed, attackers need MOM. Select which represents MOM.
Method
Opportunity
Motive
It is a weakness in a security system.
Vulnerability
Following are Software Level of Vulnerabilities / Threats except.
Deletion
Modification
Theft
Connection
Connection
These are means and ways to block a threat, which tries to exploit one or more vulnerabilities.
Controls
A kind of attack characterized when an unauthorized party (human or not) gains access to an asset.
Interception
This involves the use of a physical or biological characteristic of a human body to authenticate a user.
Biometrics
A kind of threat in which an asset becomes lost, unavailable, or unusable.
Interruption
A type of attack that involves trying every possible combination of characters until the correct password is found.
Dictionary Attack.
Which of the following is not an example of Inadvertent Program Flaw.
Sufficient identification and authentication mechanism.
Which of the following is not a control category in a physical security program?
Delaying and lighting
The act of pretending to be another person (or entity) for the purpose of entertainment or fraud of entertainment or fraud.
Impersonation
Choose which among the following is/are type/s of Attacks on Data CIA.
Disclosure
Unauthorized modification/deception
Disruption
Usurpation
The following are the Basic Components of Security except.
Secrecy