1. What are some examples of security goals that you may have for an organization? Check all that apply. Answers To protect customer data from
Category: Course 5-It Security Defense Against The Digital Dark Arts
1. What is an attack vector? Answers The classification of attack type The direction an attack is going in A mechanism by which an attacker
1. Why is normalizing log data important in a centralized logging setup? Answers Log normalizing detects potential attacks. Uniformly formatted logs are easier to store
1. How is authentication different from authorization? Answers Authentication is verifying access to a resource; authorization is verifying an identity. Authentication is identifying a resource; authorization is
1. In the CIA Triad, “Confidentiality” means ensuring that data is: Answers accurate and was not tampered with. available and that people can access it.
1. What are the components that make up a cryptosystem? Check all that apply. Answers Key generation algorithms Encryption algorithms Transmission algorithms Decryption algorithms 2.