Quiz 7 : Computer Security
There is a single authority over the root to certificate authorities to sign public keys in the PKI.
False
Examples of major disruptions include extreme weather, application failure, and criminal activity.
True
Fencing and mantraps are examples of physical controls.
True
In an incremental backup, you start with a full backup when network traffic is light. Then, each night, you back up only that day's changes.
True
Key Encapsulation with the term key wrapping is used when the KEK is the secret key.
True
Kim is the risk manager for a large organization. She is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. Given this scenario, what is the single loss expectancy (SLE)?
$2,000,000
What is a key principle of risk management programs?
Don't spend more to protect an asset than it is worth.
A bit-flipping attack is not knowing what the message says and changing it bit by bit.
False
A structured walk-through test is a review of a business continuity plan to ensure that contact numbers are current and that the plan reflects the company's priorities and structure.
False
Deterrent controls identify that a threat has landed in your system.
False