click below
click below
Normal Size Small Size show me how
CYB1UofI_FISCH1.7
Exercises
| Question | Answer |
|---|---|
| Explain the difference between a vulnerability and a threat. | |
| What are six items that might be considered logical controls? | |
| What term might you use to describe the usefulness of data? | |
| Which category of attack is an attack against confidentiality? | |
| How do you know at what point you can consider your environment to be secure? | |
| Using the concept of defense in depth, what layers might you use to secure yourself against someone removing confidential data from your environment on a USB flash drive? | |
| Based on the Parkerian hexad, what principles are affected if you lose a shipment of encrypted backup tapes that contain personal and payment information for your customers? | |
| If the web servers in your environment are based on Microsoft’s Internet Information Services (IIS) and a new worm is discovered that attacks Apache web servers, what do you not have? | |
| If you develop a new policy for ur environment that requires u2 use complex/automatically generated passwords that are unique to each system/are minimum of 30 characters in length, such as “!Qa4(j0nO$&xn1%2AL34ca#!Ps321$,” what will be adversely impacted? | |
| Considering the CIA triad and the Parkerian hexad, what are the advantages and disadvantages of each model? |