Home
Flashcards
Preview
GCC Class 1 Lesson 4 Quiz
Home
Get App
Take Quiz
Create
What security controls provide for the detection of unauthorized access, theft, or alteration of data resources?
A. Data loss prevention (DLP) controls.
B. Change management.
C. Risk avoidance controls.
D. Incident management.
A. Data loss prevention (DLP) controls.
What is the term used for the probability of a potential threat becoming a security incident?
A. Vulnerability.
B. Threat.
C. Incident.
D. Risk.
D. Risk.
What type of control methods are intended to mitigate or correct any harm done by the exploitation of a system vulnerability?
A. Preventative.
B. Compensating.
C. Detective.
D. Corrective.
D. Corrective.
What is the process that identifies the probability of threats becoming incidents?
A. Risk analysis.
B. Risk exposure.
C. Risk assessment.
D. Risk calculation.
A. Risk analysis
What is the security policy that restricts the access authorization of a user to only the resources required to do his or her job?
A. Acceptable use.
B. The principle of least privilege.
C. Privacy policy.
D. Mandatory vacations.
B. The principle of least privilege.
Author
williamsanders
ID
352824
Card Set
GCC Class 1 Lesson 4 Quiz
Description
GCC Class 1 Lesson 4 Quiz
Updated
2020-08-11T17:48:01Z
Home
Flashcards
Preview