Supports the principle of least privilege by providing that only authorized individuals, processes, or systems should have
Fantastic news! We've Found the answer you've been seeking!
Question:
Supports the principle of "least privilege" by providing that only authorized individuals,
processes, or systems should have access to information on a need−to−know basis.
a. Deterrent controls
b. Confidentiality
c. Incident
d. Availability
3. A security event that compromises the confidentiality, integrity, or availability of an information
asset.
a. Incident
b. Breach
c. Trademark
d. Due care
4. A hacker gains access to a webserver and can view a file on the server containing credit card
numbers. Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card
file are violated?
a. Availability
b. Confidentiality
c. Integrity
5. A member of staff denies sending a particular message. Which reliability aspect of information is
in danger here?
a. availability
b. correctness
c. integrity
d. confidentiality
6. When a message sent by a user is digitally signed with a private key, the person will not be able
to deny sending the message. This application of encryption is an example of
a. Authentication
b. Nonrepudiation
c. Confidentiality
d. Auditing
Related Book For
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date: