Discuss, Learn and be Happy דיון בשאלות

help brightness_4 brightness_7 format_textdirection_r_to_l format_textdirection_l_to_r

A main objective of awareness training is

1
done
All employees must understand their basic security responsibilities.
by
מיין לפי

What is a primary target of a person employing social engineering?

1
done
Social engineering deals with individual dynamics as opposed to group dynamics, as the primary targets are help desks and/or administrative or technical support people.
by
מיין לפי

Social engineering can take many forms EXCEPT

1
done
An effective countermeasure is to have very good, established information security policies that are communicated across your organization.
by
מיין לפי

Incident response planning can be instrumental in

1
done
The goals of a well-prepared incident response team are to detect potential information security breaches and provide an effective and efficient means of dealing with the
by
מיין לפי

Two types of covert channels are storage based or:

1
sentiment_very_satisfied
Timing channel — using timing of occurrences of an activity to transfer information in an unintended manner. Saturating or not saturating a communications path in a timed fashion can transfer information to a receiver observing the communication path in synchronism with the sender.
by
מיין לפי
by Daniel Margalit
Daniel Margalit 0 נקודות · יותר מ-6 חודשים
מוניטין: 515
The TCSEC defines two kinds of covert channels: Storage channels - Communicate by modifying a "storage location", such as a hard drive. Timing channels - Perform operations that affect the "real response time observed" by the receiver.
by

Data remanence is:

1
done
When some data, after the magnetic media is written over or degaussed, still remains on the magnetic media.
by
מיין לפי

Internal intruders are NOT usually defined as:

1
done
Authorized users trying to gain access to data or resources beyond their need-to-know or access limitations. Authorized users trying to gain unauthorized physical access to network connections, server equipment, etc.
by
מיין לפי

How might an attacker with little systems experience gain privileged systems access?

1
done
Shoulder-surfing , the process of direct visual observation of monitor displays to obtain access to sensitive information.
by
מיין לפי

Which of the following is NOT a characteristic of a virus?

1
done
Worms usually do not cause damage to data; instead, the worm absorbs the network’s resources causing the damage.
by
מיין לפי

Requiring approval before granting system access would be:

1
sentiment_very_satisfied
Administrative controls consist of management activities such as organizational policies and procedures.
by
מיין לפי