QUESTION 1 Sensitive employee information should be profiled independently of th
ID: 3828576 • Letter: Q
Question
QUESTION 1 Sensitive employee information should be profiled independently of the container (such as a database) where it is stored, processed, or transferred. True or False? True False QUESTION 2 Which one of the following is NOT a threat activity? A. Spoofing B. Password Guessing C. Regulatory Fines D. Brute-Force E. Session Hijacking QUESTION 3 Which one of the following would be considered a vulnerability? A. Website Performance Degradation B. Temporary power outage C. Drop in Stock Price D.Files Aren't Scanned for Malware E. Payroll Information QUESTION 4 Which one of the following is considered a vulnerability? A. Attempting to Guess User Account Passwords B. Unauthorized Use of Services and Assets C. Poor Key Management D. Destruction of Audit Logs E. Denial of Service AttackExplanation / Answer
Sensitive employee information should be profiled independently of the container
where it is stored, processed, or transferred.
True. This is because, if the container is mishandled/lost, the data should be either
kept safely/removed from those hands.
Which one of the following is NOT a threat activity?
Regulatory Fines is not considered as threat activity.
Which one of the following would be considered a vulnerability?
Files aren't scanned for malware is considered a vulnerability.
This is because the files could contain some bots which could
leak the confidential info, once added to the database/machine.
Which one of the following is considered a vulnerability.
Poor Key Management is considered to be a vulnerability.
If keys are not managed properly, they may go into prying hands, who may mishandle.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.