New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Permitting authorized access to information while protecting it from improper disclosure

A.

Integrity

B.

Confidentiality

C.

Availability

D.

ALL

Which type of attack attempts to gain information by observing the devices power consumption

A.

DOS

B.

Side Channles

C.

XSS

D.

XSRF

The harmonization of automated computing tasks, providing a consolidated and reusable workflow

A.

Cloud Orchestration

B.

Cloud Manager

C.

Cloud broker

D.

Cloud Controller

A company experiences a power outage that causes a major disruption in its operations. What type of plan will help the company sustain operations?

A.

DRP

B.

IRP

C.

BCP

D.

ALL

What is the primary purpose of a honeytoken in cybersecurity?

A.

To lure and detect attackers

B.

To encrypt sensitive data

C.

To enhance network performance

D.

To manage user access

System capabilities designed to detect and prevent the unauthorized use and transmission of information.

A.

SOC

B.

SIEM solutions

C.

Data Loss Prevention

D.

Crytography

Which of the following best describes the type of technology the team should implement to increase the work effort of buffer overflow attacks?

A.

Address space layout randomization

B.

Memory induction application

C.

Input memory isolation

D.

Read-only memory integrity checks

Which access control model is best suited for a large organization with many departments that have different data access needs

A.

DAC

B.

RBAC

C.

MAC

D.

RUBAC

A company performs an analysis of its information systems requirements functions and interdependences in order to prioritize contingency requirement. What is this process called?

A.

BCP

B.

DRP

C.

IRP

D.

BIA

The testing or evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an information system or organization.

A.

Security Assessment

B.

Risk Assessment

C.

DRP

D.

IRP