Cyber security quiz 2
Marcus considering outsourcing security functions to a third-party service provider. What benefit is he most likely to achieve?
Access to a high level of expertise
What is not a good practice for developing strong professional ethics?
Assume that information should be free
During which phase of the access control process does the system answer the question "what can the request access?"
Authorization
Janet is identifying a set of privileges that should be assigned to a new employee in our organization. Which phase of the access control process is she performing ?
Authorization
Janet is identifying the set of privileges that should be assigned to a new employee and organization. Which phase of the access control process is she performing ?
Authorization
Gary would like to choose an access control model in which the owner of the resource decides who may modify permissions on the resource. Which model fits the scenario?
Discretionary access control (DAC)
Change doesn't create risk for businesses
False
Configuration changes can be made at any time during the system life cycle and no process is required
False
Which of the following is an example of a hardware security control
MAC filtering
Mariyah's company recently experienced a major system outage due to failure of a critical component. During that time. The company did not register any sales through its online site. Which type of lost at the company experience as the road result of lost sales?
Oppeetunity cost
Which one of the following is an example of a logical access control
Password
Earl is preparing a risk register for his organizations risk manager program. Which day the element is least likely to be included in a risk register?
Risk survey results
Which formula is typically used to describe the components of information security risk?
Risk= likelihood X Vunerability
Which one of the following is an example of a two factor authentication
Smart card and personal identification number(PIN)
In alteration threat violates information integrity
True
Which one of the following is not a commonly said the best practice for password security
Use at least six Alpha numeric characters