An exposure occurs when a vulnerability _____________.
View Feedback
Question 2 2 / 2 points
Confidentiality is the principle that _____________.
View
... [Show More] Feedback
Question 3 0 / 2 points
Risk can be reduced by _____________.
View Feedback
Your quiz has been submitted successfully.
creates the possibility of incurring a loss or experiencing harm.
is reported to authorities as a source of risk.
is discovered by a penetration testing team.
is published in the Common Vulnerabilities and Exposures (CVE) database.
is lost when hackers break into a database.
ensures data security.
ensures required levels of secrecy during processing, transmission, storage, and
use of information.
ensures privacy of information.
applying countermeasures to eliminate threats and threat agents.
moving data from cloud servers to physical servers owned and operated by the
company.
moving data from physical servers to cloud-based servers.
applying countermeasures to eliminate vulnerabilities.
Question 4 2 / 2 points
A control is _____________
View Feedback
Question 5 2 / 2 points
Hashing is a control that _______
View Feedback
Question 6 0 / 2 points
________ is a legal principle that requires that individuals perform necessary actions to
prevent negligence from occurring. It is judged using the reasonable person standard.
View Feedback
Question 7 0 / 2 points
Which of the following statements is true?
used to impose penalties for misuse of confidential information.
used to eradicate the impact of an attack.
used to reduce or mitigate risks.
a mechanism for locking down configurations to prevent patching.
maps to the Integrity component of the AIC triad.
maps to the Availability and Confidentiality component of the AIC triad.
maps to the Confidentiality component of the AIC triad.
maps to the Integrity and Confidentiality components of the AIC triad.
Due care
Separation of duties
Due diligence
Customary law
View Feedback
Question 8 2 / 2 points
Clustering and load balanging are controls that ________
View Feedback
Question 9 0 / 2 points
Balanced security refers to _____________
View Feedback
Question 10 2 / 2 points
Confidentiality can be protected by implementing which of the following controls?
PCI-DSS is a federal law that protects the privacy of credit card transactions.
USA Patriot Act broadens privacy protections for federal law enforcement agents
and immigration authorities.
HIPAA applies to all medical information held and used by hospitals and doctors'
offices.
FISMA applies to federal agencies and their contractors.
map to the Availabilit [Show Less]