Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cyber Security Analyst
Quiz 10: Security Structures and Identity and Access Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 1
Multiple Choice
Which of the following IT security frameworks analyzes business requirements and then creates a "chain of traceability" through the concept, design, implementation, and continual phases of the business life cycle?
Question 2
True/False
Most U.S. organizations do not use a security framework.
Question 3
Multiple Choice
Which of the following IT security frameworks is a global non-profit association that develops practices, guidance, and benchmarks, and uses a tool called Control Objectives for Information and Related Technology (COBIT) ?
Question 4
Short Answer
A(n) ________________ defines the actions users may perform while accessing devices and networks that belong to the organization.
Question 5
Multiple Choice
Which of the following types of controls includes multifactor authentication, firewalls, and intrusion detection systems?
Question 6
Short Answer
In social engineering _______________, a threat actor masquerades as a real or fictitious character and then plays out the role on a victim.
Question 7
Multiple Choice
In which of the following does an attacker secretly relay and possibly alter communications between two parties who believe that they are directly communicating with each other?
Question 8
Short Answer
To address security issues with directory services, many organizations are turning to what framework of business processes, policies, and technologies that facilitates the management of digital identities?