ログイン

Module 1 (Info Assurance)
22問 • 12ヶ月前
  • iam noone
  • 通報

    問題一覧

  • 1

    Information should only be known to certain people.

    Confidentiality

  • 2

    Data is stored and transferred as intended and that any modification is authorized.

    Integrity

  • 3

    Information is accessible to those authorized to view or modify it

    Availability

  • 4

    Subjects cannot deny creating or modifying data

    Non-repudiation

  • 5

    develop security policies and capabilities. Evaluate risks, threats, and vulnerabilities and recommend security controls to mitigate them.

    Identify

  • 6

    procure/develop, install, operate, and decommission IT hardware and software assets with security as an embedded requirement of every stage of this operations life cycle

    Protect

  • 7

    perform ongoing, proactive monitoring to ensure that controls are effective and capable of protecting against new types of threats

    Detect

  • 8

    identify, analyze, contain, and eradicate threats to systems and data security.

    Respond

  • 9

    implement cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.

    Recover

  • 10

    - Managerial - Technical

    Chief Security Officer (CSO) Chief Information Security Officer (CISO)

  • 11

    Non-technical Due care/liability

    Information Systems Security Officer (ISSO)

  • 12

    is a location where security professionals monitor and protect critical information assets across other business functions

    Security Operations Center (SOC)

  • 13

    Controls implemented in operating systems, software, and security appliances

    Technical

  • 14

    Controls that depend on a person for implementation

    Operational

  • 15

    Controls that give oversight of the system

    Manegerial

  • 16

    is something designed to give a system or data asset the properties of confidentiality, integrity, availability, and non-repudiation.

    Security control

  • 17

    Physically or logically restricts unauthorized access (operates before attack)

    Preventive

  • 18

    May not prevent or deter access, but it will identify and record any attempted or successful intrusion (operates during an attack)

    Detective

  • 19

    Responds to and fixes an incident and may also prevent its reoccurrence (Operates after an attack)

    Corrective

  • 20

    Controls such as alarms, gateways, and locks that deter access to premises and hardware.

    Physical

  • 21

    May not physically or logically prevent access, but psychologically discourages an attacker from attempting an intrusion.

    Deterrent

  • 22

    Substitutes for a principal control

    Compensating

  • Data Structure (history)

    Data Structure (history)

    iam noone · 64問 · 1年前

    Data Structure (history)

    Data Structure (history)

    64問 • 1年前
    iam noone

    Linear Data Structure

    Linear Data Structure

    iam noone · 43問 · 1年前

    Linear Data Structure

    Linear Data Structure

    43問 • 1年前
    iam noone

    Searching for Algorithms

    Searching for Algorithms

    iam noone · 22問 · 1年前

    Searching for Algorithms

    Searching for Algorithms

    22問 • 1年前
    iam noone

    Linked list/ Trees and graphs

    Linked list/ Trees and graphs

    iam noone · 51問 · 1年前

    Linked list/ Trees and graphs

    Linked list/ Trees and graphs

    51問 • 1年前
    iam noone

    Sorting algorithms

    Sorting algorithms

    iam noone · 41問 · 1年前

    Sorting algorithms

    Sorting algorithms

    41問 • 1年前
    iam noone

    INTRO TO MS ACCESS(database)

    INTRO TO MS ACCESS(database)

    iam noone · 19問 · 1年前

    INTRO TO MS ACCESS(database)

    INTRO TO MS ACCESS(database)

    19問 • 1年前
    iam noone

    Introduction To Java Programming Language

    Introduction To Java Programming Language

    iam noone · 80問 · 1年前

    Introduction To Java Programming Language

    Introduction To Java Programming Language

    80問 • 1年前
    iam noone

    Mod 2: Comp Prog

    Mod 2: Comp Prog

    iam noone · 55問 · 1年前

    Mod 2: Comp Prog

    Mod 2: Comp Prog

    55問 • 1年前
    iam noone

    COMP PROG MIDTERM

    COMP PROG MIDTERM

    iam noone · 42問 · 1年前

    COMP PROG MIDTERM

    COMP PROG MIDTERM

    42問 • 1年前
    iam noone

    FUNDAMENTALS OF DATABASE (Lesson 1)

    FUNDAMENTALS OF DATABASE (Lesson 1)

    iam noone · 31問 · 1年前

    FUNDAMENTALS OF DATABASE (Lesson 1)

    FUNDAMENTALS OF DATABASE (Lesson 1)

    31問 • 1年前
    iam noone

    FUNDAMENTALS OF DATABASE (part2)

    FUNDAMENTALS OF DATABASE (part2)

    iam noone · 33問 · 1年前

    FUNDAMENTALS OF DATABASE (part2)

    FUNDAMENTALS OF DATABASE (part2)

    33問 • 1年前
    iam noone

    DATABASE 2-5 MOD

    DATABASE 2-5 MOD

    iam noone · 25問 · 1年前

    DATABASE 2-5 MOD

    DATABASE 2-5 MOD

    25問 • 1年前
    iam noone

    DEPTALS (COMP PROG)

    DEPTALS (COMP PROG)

    iam noone · 49問 · 1年前

    DEPTALS (COMP PROG)

    DEPTALS (COMP PROG)

    49問 • 1年前
    iam noone

    HCI HISTORY

    HCI HISTORY

    iam noone · 18問 · 11ヶ月前

    HCI HISTORY

    HCI HISTORY

    18問 • 11ヶ月前
    iam noone

    Module 1 (System Analysis)

    Module 1 (System Analysis)

    iam noone · 18問 · 12ヶ月前

    Module 1 (System Analysis)

    Module 1 (System Analysis)

    18問 • 12ヶ月前
    iam noone

    Module 1 (Data Analytics)

    Module 1 (Data Analytics)

    iam noone · 35問 · 12ヶ月前

    Module 1 (Data Analytics)

    Module 1 (Data Analytics)

    35問 • 12ヶ月前
    iam noone

    Module 2(Data Analytics)

    Module 2(Data Analytics)

    iam noone · 35問 · 11ヶ月前

    Module 2(Data Analytics)

    Module 2(Data Analytics)

    35問 • 11ヶ月前
    iam noone

    Module 1 (Networking)

    Module 1 (Networking)

    iam noone · 25問 · 12ヶ月前

    Module 1 (Networking)

    Module 1 (Networking)

    25問 • 12ヶ月前
    iam noone

    mod 1 IT LIVING

    mod 1 IT LIVING

    iam noone · 61問 · 11ヶ月前

    mod 1 IT LIVING

    mod 1 IT LIVING

    61問 • 11ヶ月前
    iam noone

    問題一覧

  • 1

    Information should only be known to certain people.

    Confidentiality

  • 2

    Data is stored and transferred as intended and that any modification is authorized.

    Integrity

  • 3

    Information is accessible to those authorized to view or modify it

    Availability

  • 4

    Subjects cannot deny creating or modifying data

    Non-repudiation

  • 5

    develop security policies and capabilities. Evaluate risks, threats, and vulnerabilities and recommend security controls to mitigate them.

    Identify

  • 6

    procure/develop, install, operate, and decommission IT hardware and software assets with security as an embedded requirement of every stage of this operations life cycle

    Protect

  • 7

    perform ongoing, proactive monitoring to ensure that controls are effective and capable of protecting against new types of threats

    Detect

  • 8

    identify, analyze, contain, and eradicate threats to systems and data security.

    Respond

  • 9

    implement cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.

    Recover

  • 10

    - Managerial - Technical

    Chief Security Officer (CSO) Chief Information Security Officer (CISO)

  • 11

    Non-technical Due care/liability

    Information Systems Security Officer (ISSO)

  • 12

    is a location where security professionals monitor and protect critical information assets across other business functions

    Security Operations Center (SOC)

  • 13

    Controls implemented in operating systems, software, and security appliances

    Technical

  • 14

    Controls that depend on a person for implementation

    Operational

  • 15

    Controls that give oversight of the system

    Manegerial

  • 16

    is something designed to give a system or data asset the properties of confidentiality, integrity, availability, and non-repudiation.

    Security control

  • 17

    Physically or logically restricts unauthorized access (operates before attack)

    Preventive

  • 18

    May not prevent or deter access, but it will identify and record any attempted or successful intrusion (operates during an attack)

    Detective

  • 19

    Responds to and fixes an incident and may also prevent its reoccurrence (Operates after an attack)

    Corrective

  • 20

    Controls such as alarms, gateways, and locks that deter access to premises and hardware.

    Physical

  • 21

    May not physically or logically prevent access, but psychologically discourages an attacker from attempting an intrusion.

    Deterrent

  • 22

    Substitutes for a principal control

    Compensating