Quiz

What is the cyclical process that Defensive Cyber Operators use to defend their networks?

  1. Detect, Prevent, Respond

  2. Harden, Find, Kick out

  3. Prevent, Detect, Respond

  4. Observe, Orient, Decide, Act

Answer: Prevent, Detect, Respond

Which is not a control we use in Information Assurance?

  1. Physical

  2. Confidentiality

  3. Technical

  4. Administrative

Answer: Confidentiality

What does the "A" in the "CIA Triad" stand for?

  1. Authentication

  2. Authorization

  3. Availability

  4. Access

Answer: Availability

In order for Charlie to access the ACME Corporations webserver, he must enter his username and password in order to ________ himself?

  1. Authorize

  2. Achieve

  3. Access

  4. Authenticate

Answer: Authenticate

Last updated