IT Security: Defense against the digital dark arts already passed
In the CIA Triad, "Confidentiality" means ensuring that data is: not accessible by unwanted parties In the CIA Triad, "Integrity" means ensuring that data is: accurate and wasn't tampered with In the CIA Triad, "Availability" means ensuring that data is: available and people can access it What's the relationship between a vulnerability and an exploit? An exploit takes an advantage of a vulnerability to run arbitrary code or gain access. Which statement is true for both a worm and a virus? They are self-replicating and selfpropagatin Check all examples of types of malware: Viruses Adware Worms What are the characteristics of a rootkit? Check all that apply. Difficult to detect Provides elevated credentials
Written for
- Institution
- IT Security: Defense against the digital dark arts
- Course
- IT Security: Defense against the digital dark arts
Document information
- Uploaded on
- May 7, 2024
- Number of pages
- 1
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
it security defense against the digital dark arts