GCC Class 1 Lesson 4 Quiz

  1. What security controls provide for the detection of unauthorized access, theft, or alteration of data resources?



    A. Data loss prevention (DLP) controls.
  2. What is the term used for the probability of a potential threat becoming a security incident?



    D. Risk.
  3. What type of control methods are intended to mitigate or correct any harm done by the exploitation of a system vulnerability?



    D. Corrective.
  4. What is the process that identifies the probability of threats becoming incidents?



    A. Risk analysis
  5. What is the security policy that restricts the access authorization of a user to only the resources required to do his or her job?



    B. The principle of least privilege.
Author
williamsanders
ID
352824
Card Set
GCC Class 1 Lesson 4 Quiz
Description
GCC Class 1 Lesson 4 Quiz
Updated