Matching
Match each term with the correct statement below.
Premises:
Periodic reviewing of a subject's privileges over an object
Refers to a methodology for making modifications and keeping track of those changes
Grouping individuals and organizations into clusters or groups based on some sort of affiliation
A subject's access level over an object, such as a user's ability to open a payroll file
The likelihood that the threat agent will exploit the vulnerability
A person or element that has the power to carry out a threat
A flaw or weakness that allows a threat agent to bypass security
A type of action that has the potential to cause harm
Responses:
Threat
Privilege
Social networking
Change management
Vulnerability
Privilege auditing
Threat agent
Risk
Privilege management
Correct Answer:
Premises:
Responses:
Threat
Privilege
Social networking
Change management
Vulnerability
Privilege auditing
Threat agent
Risk
Privilege management
Premises:
Threat
Privilege
Social networking
Change management
Vulnerability
Privilege auditing
Threat agent
Risk
Privilege management
Responses:
Related Questions
Q30: _ networks are typically used for connecting
Q31: _ are generally considered to be the
Q32: Education in an enterprise is limited to
Q33: A(n) _ is a collection of requirements
Q35: What are the duties of the CMT?
Q36: A(n) _ policy is designed to produce
Q37: _ is the planning, coordination, communications, and
Q38: At the heart of information security is
Q40: _ learners learn through taking notes, being
Q43: Most organizations follow a three-phase cycle in