Home
Flashcards
Preview
mta 98-367
Home
Get App
Take Quiz
Create
3 points in the CIA triangle
availability, confidentiality, integrity
what is confidentiality achieved through
strict control of permissions
integrity uses which of the following to make sure data is accurate
accounting
which part of the CIA triangle is responsible for protection
availability
which of the following is a possibility that data can be compromised
threat
what is a weakness in CIA
vunerability
the possibility a threat will happen
risk
what is residual risk interwined with
mitigation
what would you need to showy you what can be done to lower the risk in a risk registrar
contingency column
2 things that should be used to control permissions
groups and roles
what is social engineering
attempt to get information by manipulating human psychology
what is an example of social engineering
phishing
in an application what is a reason the attack surface can be larger
number of users
what is an attack surface
totality of ways in which a suystem can be attacked
within employees what is a reason that the attack surface can be larger
falling victum to social engineering
what is the process of identifying threats and vulnerabilities than defining countermeasures to prevent them
threat modeling
what kind of site security is immediately inside the building
internal perimeter
what is used to physically secure laptops
kensington slots
fundamental way to look at security in your business
looked from inside out
two ways smartphones should be protected in a business environment
password, and pin
little text files that are written when you go to websites
cookies
what security type uses AES for encryption
WPA2-PSK
what do you have to turn on in order to make MAC addressing work
access control
Author
tffnyhghs
ID
346218
Card Set
mta 98-367
Description
98-367
Updated
2019-03-31T19:50:19Z
Home
Flashcards
Preview