Quiz
What is the cyclical process that Defensive Cyber Operators use to defend their networks?
Detect, Prevent, Respond
Harden, Find, Kick out
Prevent, Detect, Respond
Observe, Orient, Decide, Act
Answer: Prevent, Detect, Respond
Which is not a control we use in Information Assurance?
Physical
Confidentiality
Technical
Administrative
Answer: Confidentiality
What does the "A" in the "CIA Triad" stand for?
Authentication
Authorization
Availability
Access
Answer: Availability
In order for Charlie to access the ACME Corporations webserver, he must enter his username and password in order to ________ himself?
Authorize
Achieve
Access
Authenticate
Answer: Authenticate
Last updated