A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is most pressing? |
Confidentiality |
Smart phones with cameras and internet capabilities pose a risk to which security concept? |
Confidentiality |
By definition, which security concept ensures that only authorized parties can access data? |
Confidentiality |
Your computer system is a participant in an asymmetric cryptography system. You’ve created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity’ provide? |
Integrity |
Which of the following is an example of an internal threat? |
A user accidentally deletes the new product design |
What is the greatest threat to the confidentiality of data in most secure organizations? |
USB Devices |
Which of the following is the correct definition of a threat? |
Any potential danger to the confidentiality, integrity, or availability of information or systems |
Which of the following is an example of a vulnerability? |
A misconfigured server |
By definition, which security concept uses the ability to prove that a sender sent an encrypted message? |
Non-repudiation |
Which of the following is not a valid concept to associate with integrity? |
Control access to resources to prevent unwanted access |
Security Pro Chapter 1 – 1.1.4 Practice Questions
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price