|Question 1||10 / 10 points|
Which of the following elements is NOT one of the security foundations?
|Question 2||10 / 10 points|
Criminal enterprises are usually motivated by __________.
|a. the desire for notoriety|
|b. an interest in hacking|
|c. the desire for financial gain|
|d. a sense of vengeance|
|Question 3||10 / 10 points|
Which of these is NOT considered a threat to the confidentiality of an information system?
|a. natural disasters|
|b. social engineering|
|c. system vulnerabilities|
|d. unintentional disclosure|
|Question 4||10 / 10 points|
The government uses all of the following data classification labels EXCEPT __________.
|d. top secret|
|Question 5||10 / 10 points|
Access controls are __________.
|a. controls that monitor the process of auditing who has access to data, what actions those with access have performed with that data, and what data may or may not have been compromised|
|b. standards that prevent eavesdropping on conversations|
|c. levels of authorization granted based on the content of a system|
|d. controls that determine how users, services, and computers interact with devices and information|
|Question 6||10 / 10 points|
Access controls use identity and data classification to support confidentiality, redundancy for availability, and safeguards that guarantee that data has not been modified, supporting integrity.
|Question 7||10 / 10 points|
Which of the following is NOT a type of access control?
|Question 8||10 / 10 points|
The Bell-La Padula model primarily supports the __________ element of the CIA triad.
|Question 9||10 / 10 points|
The Biba model primarily supports the __________ element of the CIA triad.
|Question 10||10 / 10 points|
The Clark-Wilson model primarily supports the __________ element of the CIA triad.