Quiz

What is the cyclical process that Defensive Cyber Operators use to defend their networks?

  1. Detect, Prevent, Respond

  2. Harden, Find, Kick out

  3. Prevent, Detect, Respond

  4. Observe, Orient, Decide, Act

Which is not a control we use in Information Assurance?

  1. Physical

  2. Confidentiality

  3. Technical

  4. Administrative

What does the "A" in the "CIA Triad" stand for?

  1. Authentication

  2. Authorization

  3. Availability

  4. Access

In order for Charlie to access the ACME Corporations web server, he must enter his username and password in order to ________ himself?

  1. Authorize

  2. Achieve

  3. Access

  4. Authenticate

Last updated