What is the access control step that verifies that a user is who he or she claims to be?
B. Authentication
What is the security model that determines whether a user can enter a space and obtain secured objects?
C. Access Control
A user should be aware of which parts of an organization's security policies?
D. The security policies applicable to the user and the effects of security breaches.
What is created by a flaw in an application that could be exploited by an external attacker?
C. Vulnerability
What form of security testing attempts to exploit known or identified vulnerabilities?
C. Penetration testing
To ensure that data at rest, data in motion, and data in use retain their integrity without unauthorized modification, removal, or corruption, what system should be in place as part of a data security policy?
A. Data loss prevention
An It technician identifies and removes unnecessary services and a few obsolete user accounts running on a desktop computer. Which of the following is the technician most likely performing.
A. Host hardening
Which type of authentication system uses a one-time password generated by a mobile device?
D. Device-generated OTP
What term refers to the delivery of applications as a service in which resources, software, and data are available to the application and a host via the internet?
C. Cloud computing
What type of encryption uses only a single encryption key to both encrypt and decrypt data?
D. Symmetric encryption
On which of the following encryption concepts is PKI based?
A. Symmetric encryption
What is the a DoS attack that send a flood of synchronization (SYN) request and never sends the final acknowledgment (ACK)?