Zusammenfassung der Ressource
Frage 1
Frage
A _________ prevents or inhibits the normal use or management of system facilities.
Frage 2
Frage
An one-time-use authentication token need only be protected from access by unauthorised users until it has been used by the authorised party. This is an example of the ___________.
Antworten
-
Effectiveness Principle
-
Timeliness Principle
-
Weakest Link Principle
-
Energy Principle
Frage 3
Frage
A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) _________
Antworten
-
countermeasure
-
adversary
-
vulnerability
-
risk
Frage 4
Frage
Masquerade, falsification, and repudiation are threat actions that cause __________ threat consequences
Antworten
-
unauthorized disclosure
-
disruption
-
deception
-
usurpation
Frage 5
Frage
A loss of _________ is the unauthorised disclosure of information.
Antworten
-
confidentiality
-
availability
-
authenticity
-
integrity
Frage 6
Frage
The assurance that data received are exactly as sent by an authorised entity is __________.
Antworten
-
availibility
-
confidentiality
-
authenticity
-
integrity
Frage 7
Frage
A __________ is any action that compromises the security of information owned by an organization.
Antworten
-
security mechanism
-
security policy
-
security attack
-
security service
Frage 8
Frage
________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorised manipulation of the system.
Antworten
-
system integrity
-
data integrity
-
confidentiality
-
availability