Quiz 7 : Computer Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

There is a single authority over the root to certificate authorities to sign public keys in the PKI.

False

Examples of major disruptions include extreme weather, application failure, and criminal activity.

True

Fencing and mantraps are examples of physical controls.

True

In an incremental backup, you start with a full backup when network traffic is light. Then, each night, you back up only that day's changes.

True

Key Encapsulation with the term key wrapping is used when the KEK is the secret key.

True

Kim is the risk manager for a large organization. She is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. Given this scenario, what is the single loss expectancy (SLE)?

$2,000,000

What is a key principle of risk management programs?

Don't spend more to protect an asset than it is worth.

A bit-flipping attack is not knowing what the message says and changing it bit by bit.

False

A structured walk-through test is a review of a business continuity plan to ensure that contact numbers are current and that the plan reflects the company's priorities and structure.

False

Deterrent controls identify that a threat has landed in your system.

False


Ensembles d'études connexes

Managerial Accounting Chapter 2 HW

View Set

9. Rumen Tympany, TRP and Ulcers

View Set

Chapter 3 Review [Art-1301-10015]

View Set

History 700 Unit 8 Political Science Test Study Guide

View Set

Photosynthesis and Cellular Respiration Questions

View Set

9th grade Literature EOCT literary language

View Set

Chapter 9 Teaching and counseling

View Set

RMF Step 4 - Security Control Assessment

View Set

Chapter 10: Alcohol and Other Drugs

View Set