Beruflich Dokumente
Kultur Dokumente
Question 1:
Your organization has recently suffered a cyber attack when an employee made an
unauthorized modification to another employee's timesheet and payroll records. What
objective of cybersecurity has been violated?
Confidentiality
Integrity
Availability
Non- repudation
Question 2:
When does an attacker try to gain complete control of a system during a penetration test?
Planning
Attack
Reporting
Discovery
Question 3:
Which security control allows a Windows system administrator to efficiently manage system
configuration settings across a large number of systems?
Patch management
HIPS
Anti-malware
GPO