Weekly challenge 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

A security professional is ensuring proper storage, maintenance, and retention of their organization's data. Which domain does this scenario describe?

Asset security

Fill in the blank: A ______ is malicious code written to interfere with computer operations and cause damage to data

Computer Virus

Fill in the blank: Social engineering is a manipulation technique that exploits ____ error to gain access to private information.

Human

A security professional is setting up access keycards for new employees. Which domain does this scenario describe?

Identity and access management

Which of the following tasks may be part of the security operations domain?

Implementing preventive measures, Conducting investigations, Investigating an unknown device that has connected to an internal network

What historical event used a malware attachment to steal user information and passwords?

LoveLetter attack

Which of the following tasks are part of the security and risk management domain? Select all that apply.

Business continuity, Defining security goals and objectives, Compliance

A security professional is optimizing data security by ensuring that effective tools, systems, and processes are in place. Which domain this scenario describe?

Security architecture and engineering

A security professional is auditing user permissions at their organization in order to ensure employees have the correct access levels. Which domain does this scenario describe?

Security assessment and testing


Conjuntos de estudio relacionados

TCM Theories 1 The cause of disease

View Set

Cohen Chapter 7: Love and Romantic Relationships

View Set

Lesson 4: Comparing and Contrasting Different Data Structures, Formats, and Markup Languages

View Set

PHARM CH 37, 39, 40 (PART 1): GI Meds

View Set

macroeconomic ch10, 11, 12 test- example problems

View Set

Ch. 6 Health Insurance Policy Provisions

View Set