What is called the formal acceptance of the adequacy of a system's overall security by the management?
The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system is referred to as?
Related to information security, the prevention of the intentional or unintentional unauthorized disclosure of contents is which of the following?
Making sure that the data has not been changed unintentionally, due to an accident or malice is:
Which of the following is a CHARACTERISTIC of a decision support system (DSS) in regards to Threats and Risks Analysis?
Within the context of the CBK, which of the following provides a MINIMUM level of security ACCEPTABLE for an environment ?
Related to information security, integrity is the opposite of which of the following?
Who is ultimately responsible for the security of computer based information systems within an organization?
What can be defined as: It confirms that users’ needs have been met by the supplied solution ?
Which of the following security controls might force an operator into collusion with personnel assigned organizationally within a different function in order to gain access to unauthorized data?
When submitting a passphrase for authentication, the passphrase is converted into ...
In non-discretionary access control using Role Based Access Control (RBAC), a central authority determines what subjects can have access to certain objects based on the organizational security policy. The access controls may be based on:
What protocol is used on the Local Area Network (LAN) to obtain an IP address from it's known MAC address?
Which of the following elements of telecommunications is not used in assuring confidentiality?
PDF + Testing Engine |
---|
$66 |
Testing Engine |
---|
$50 |
PDF (Q&A) |
---|
$42 |
ISC Free Exams |
---|
|