Quiz
What is the cyclical process that Defensive Cyber Operators use to defend their networks?
Detect, Prevent, Respond
Harden, Find, Kick out
Prevent, Detect, Respond
Observe, Orient, Decide, Act
Which is not a control we use in Information Assurance?
Physical
Confidentiality
Technical
Administrative
What does the "A" in the "CIA Triad" stand for?
Authentication
Authorization
Availability
Access
In order for Charlie to access the ACME Corporations web server, he must enter his username and password in order to ________ himself?
Authorize
Achieve
Access
Authenticate
Last updated