![]() Only specific employees are allowed to read it. The resulting assessment is treated as confidential and is not shared with Alice's coworkers. threat agent Alice has performed a security assessment for Acme Widget. ![]() When analyzing the boundary, is the window considered a wall or a doorway?Ī) Wall b) Doorway A _ is someone who is motivated to attack our assets. The window is generally left locked, but it may be opened. When analyzing the apartment's boundary, is the window considered a wall or a doorway?ī) Doorway a) Wall An apartment has a large window that is provided in part as an emergency exit in case of a fire. An apartment has a large window, which is covered with metal bars to prevent people from going through the window. Which of the following is a person who has learned specific attacks on computer systems and can use those specific attacks?ĭ) Hacker a) Cracker Which of the following are the CIA properties?Ĭ) Integrity True or False? A vulnerability is a security measure intended to protect an asset.įalse False An attempt by a threat agent to exploit assets without permission is referred to as:ī) a vulnerability. cybersecurity True or False? Security Category RMF begins with a high-level estimate of the impact caused by cyber security failures.įalse True True or False? A vulnerability is a weakness in the boundary that protects the assets from the threat agents.įalse True True or False? A threat agent is a person who did attack our assets, while an attacker might attack an asset.įalse False CIA properties do not include:ĭ) availability. Patent Pending Protection: USB Block uses multi-layer patent pending protection that works on Windows Kernel Level and block unauthorized and malicious devices from accessing your data even in Safe Mode.Which of the following is an example of a rule-based security decision?ī) Performing a step-by-step security analysisĭ) Trying to outdo a neighbor's security measures a) Locking a car's ignition Which of the following is an example of security theater?ĭ) Choosing a defense based on a systematic, step-by-step processĬ) Trying to outrun a hungry bear b) Installing a fake video camera True or False? The term "security theater" refers to security measures intended to make potential victims feel safe and secure without regard to their effectiveness.įalse True Risk Management Framework is a way to assess _ risks when developing large-scale computer systems.It does not complicate its users with technical jargon rather it provides them an easy way to block unauthorized devices from accessing their data. User Friendly Graphical Interface: USB Block is an easy to use data leak prevention software with a user friendly graphical interface.Block Media & Blu-ray Discs: The application also blocks any disc that uses the disk hub, bay, combo or CD/DVD drive and allots a drive letter, for example CD-R, CD-RW, CD-RAM, DVD-R,ĭVD-RW, DVD-RAM, HD-R, HD-RW, HD-RAM, Blu Ray-R, Blu Ray-RW, Blu Ray-RAM, Floppy Disk A, Floppy Disk B and Zip Drives.Block Memory Cards & iPods: The program also blocks SD Cards, MMCs, Memory Sticks, Digital Cameras, Memory Cell Phones, iPods, Blackberry, Android and Other Mobile Phones. ![]() By default, all types of USB drives are blocked including external drives, FireWire, Enhanced mini-USB, Host Controller Interface (HCI), HP-IL, Com, LPT, IrDA, USB on-the-go, U3, EHCI, RAID Controller, Host adapter, Serial Cable (use with data transfer), Serial ATA, ACCESS.bus and any storage device that is attached to USB port showing a drive in the system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |