Quiz 1 Flashcards

1
Q

Someone (a person or a system) is authorized to perform one or more actions on a digital asset.

A

Controlled Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is when sensitive data are in an exposed, uncontrolled condition.

A

Incomplete Mediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For an attack to be executed, attackers need MOM. Select which represents MOM.

A

Method
Opportunity
Motive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is a weakness in a security system.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Following are Software Level of Vulnerabilities / Threats except.
Deletion
Modification
Theft
Connection

A

Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These are means and ways to block a threat, which tries to exploit one or more vulnerabilities.

A

Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A kind of attack characterized when an unauthorized party (human or not) gains access to an asset.

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This involves the use of a physical or biological characteristic of a human body to authenticate a user.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A kind of threat in which an asset becomes lost, unavailable, or unusable.

A

Interruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of attack that involves trying every possible combination of characters until the correct password is found.

A

Dictionary Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not an example of Inadvertent Program Flaw.

A

Sufficient identification and authentication mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is not a control category in a physical security program?

A

Delaying and lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The act of pretending to be another person (or entity) for the purpose of entertainment or fraud of entertainment or fraud.

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Choose which among the following is/are type/s of Attacks on Data CIA.

A

Disclosure
Unauthorized modification/deception
Disruption
Usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The following are the Basic Components of Security except.

A

Secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the best choice in choosing security guard for a physical access control mechanism?

A

When discriminating judgement is required.

16
Q

Which of the following problems are caused by humidity on electrical devices?

A

High humidity causes power fluctuations whereas low humidity causes static electricity.

17
Q

Circumstances that have a potential to cause harm in a system.

A

Threat

18
Q

Which of the following means an access control has a fail-safe characteristic but not a fail-secure characteristic?

A

It defaults to being locked.

19
Q

The use of people skills to obtain information from employees that should not be released.

A

Social Engineering

20
Q

What will be your first reaction to an exploit. Select the best answer.

A

Report it immediately.

21
Q

Under Data Privacy Act, which of the following is not part of the rights of a Data Subject.

A

Right to allow fraud.

22
Q

Which of the following steps should taken initially when a fire has been detected?

A

Turn of the fire suppression system

23
Q

The following are the Basic Components of Security except.

A

Secrecy

24
Q

What is a mantrap?

A

A double-door room used for physical access control.

25
Q

A set of systematic techniques designed to reveal hazardous system states.

A

Hazard Analysis

25
Q

A type of test that ensures a system generates correct output values in light of known input values does not consider the internal workings of the system.

A

Black Box