mta 98-367

  1. 3 points in the CIA triangle
    availability, confidentiality, integrity
  2. what is confidentiality achieved through
    strict control of permissions
  3. integrity uses which of the following to make sure data is accurate
    accounting
  4. which part of the CIA triangle is responsible for protection
    availability
  5. which of the following is a possibility that data can be compromised
    threat
  6. what is a weakness in CIA
    vunerability
  7. the possibility a threat will happen
    risk
  8. what is residual risk interwined with
    mitigation
  9. what would you need to showy you what can be done to lower the risk in a risk registrar
    contingency column
  10. 2 things that should be used to control permissions
    groups and roles
  11. what is social engineering
    attempt to get information by manipulating human psychology
  12. what is an example of social engineering
    phishing
  13. in an application what is a reason the attack surface can be larger
    number of users
  14. what is an attack surface
    totality of ways in which a suystem can be attacked
  15. within employees what is a reason that the attack surface can be larger
    falling victum to social engineering
  16. what is the process of identifying threats and vulnerabilities than defining countermeasures to prevent them
    threat modeling
  17. what kind of site security is immediately inside the building
    internal perimeter
  18. what is used to physically secure laptops
    kensington slots
  19. fundamental way to look at security in your business
    looked from inside out
  20. two ways smartphones should be protected in a business environment
    password, and pin
  21. little text files that are written when you go to websites
    cookies
  22. what security type uses AES for encryption
    WPA2-PSK
  23. what do you have to turn on in order to make MAC addressing work
    access control
Author
tffnyhghs
ID
346218
Card Set
mta 98-367
Description
98-367
Updated