1.
A(n) _____________ is a quantitative review of risks, to determine how an organization continue to function, in the event a risk is realized. .
2.
A(n)___________ is a one-way mathematical function that maps variable values into smaller values of a fixed length.
3.
At ABC Corporation, access to critical information resources, such as database and e-mail servers, is controlled by the information-technology (IT) department. The supervisor in the department grants access to printers where the printer is located. Managers grant and revoke rights to files within their departments' directories on the file server, but the IT department controls who has access to the directories. Which type of access-management system is in use at ABC Corporation?
4.
One individual is selected from each department, to attend a security-awareness course. Each person returns to his department, delivering the course to the remainder of the department. After training is complete, each person acts as a peer coach. Which type of training is this?
5.
Which of the following is an example of a simple, physical-access control?
6.
A(n) __________ is an abstract machine, which mediates all access subjects have to objects.
7.
__________ is the state of being correct, or the degree of certainty a person or process can have, that the data in an information asset is correct.
8.
Enterprise employees working remotely require access to data at an organization's headquarters. Which of the following is the BEST method to transfer this data?
9.
INFOSEC professionals are concerned about providing due care and due diligence. With whom should they consult, when protecting information assets?
10.
The items listed below are examples of ___________ controls.
*Procedures and policies
*Employee security-awareness training
*Employee background checks
*Increasing management security awareness