What do you call the security discipline that requires that a
user is given no more privilege necessary to perform his or
her job - ANSWERprinciple of least privilege
What do you call the scope that hacker can use to break
into a system - ANSWERattack surface
What method used by hackers relies on the trusting nature
of the person being attacked - ANSWERsocial engineering
What is the best way to protect against social engineering
- ANSWERemployee awareness
, What is needed to highly secure a system -
ANSWERmore money
What is the first line of defense when setting up a network
- ANSWERphysically secure the network
Which concept determines what resources users can
access after they log on - ANSWERaccess control
What is used to provide protection when one line of
defense is breached - ANSWERdefense in depth
, What is used to identify a person before giving access -
ANSWERauthentication
What is used to verify that an administrator is not
accessing data that he should not be accessing -
ANSWERauditing
What type of device can be easily lost or stolen can be
used for espionage - ANSWERremovable devices
What is a physical or logical device used to capture
keystroke - ANSWERkey logger