Comment on page
Quiz
What is the cyclical process that Defensive Cyber Operators use to defend their networks?
- 1.Detect, Prevent, Respond
- 2.Harden, Find, Kick out
- 3.Prevent, Detect, Respond
- 4.Observe, Orient, Decide, Act
Which is not a control we use in Information Assurance?
- 1.Physical
- 2.Confidentiality
- 3.Technical
- 4.Administrative
What does the "A" in the "CIA Triad" stand for?
- 1.Authentication
- 2.Authorization
- 3.Availability
- 4.Access
In order for Charlie to access the ACME Corporations web server, he must enter his username and password in order to ________ himself?
- 1.Authorize
- 2.Achieve
- 3.Access
- 4.Authenticate