Fill This Form To Receive Instant Help
Homework answers / question archive / Question 1 ) Physical security is just as critical concept in Information Security as Computer Security and Cyber Security
Question 1 )
Physical security is just as critical concept in Information Security as Computer Security and Cyber Security .
Question 2
Deterrent controls are security controls designed to discourage those who might seek to violate our security.
Question 3
Physical Security deals with protection of equipment, technology and people.
Question 4
Security Awareness Training should include considering Physical Conditions for protecting equipment include Site Selection, Securing Access and Environmental Conditions.
Question 5
Network Design is NOT an important consideration for protecting computer networks.
Question 6
A Firewall is a mechanism for maintaining control over the traffic that flows into and out of our networks.
Question 7
Proxy Servers have no relation to a firewall.
Question 8
Data can be intercepted from both wired and wireless networks, often with very little effort.
Question 9
A network or protocol analyzer, also known as a packet sniffer, or sniffer, is a tool that can intercept traffic, commonly referred to as sniffing.
Question 10
Anti-Malware tools protect systems and include executable Space Protection.
Question 11
Properly configured software firewalls are NOT a useful additional layer of security we can add to the hosts residing in our networks.
Question 12
Host-based intrusion detection systems (HIDSes) are used to analyze the activities on or directed at the network interface of a particular host.
Question 13
Buffer overflows, or buffer overruns, occur when we do not properly account for the size of the data input into our application.
Question 14
BURP SUITE is NOT an example of a Web Application Analysis Tool.
Question 15
Operating Technology also known as Industrial Control Systems (ICS) are made up of Supervisory Control and Data Acquisition Systems (SCADA).
Question 16
Covert activity is very similar to conventional warfare in its approach.
Question 17
Social Engineering is the act of influencing someone's behavior through manipulating their emotions, or gaining and betraying their trust to gain access to their system.
Question 18
General access attacks are targeted at gaining entry into a specific system or network.
Question 19
Cyber reconnaissance can be divided into 3 categories including Open Source Intelligence (OSINT).
Question 20
The process of Obfuscation means to clarify and acknowledge.
Question 21
The measures one takes to protect information can be broken down into 3 categories: Confidentiality, Integrity and Availability.
Question 22
Digital forensics is the science of applying and analyzing evidence as it applies to computer devices and networks to present in court.
Question 23
The right to wage war includes such elements as right authority, right intention, probability of success, and proportionality.
Question 24
Moving forward, the U.S. Congress should not be involved with setting the course for policy and legal statues for Cyber-Security, rather that responsibility should be left exclusively to the Executive Branch.
Question 25
What does a cyber-warrior look like and what differences exist between cyber forces and traditional forces?