Multiple Choice
Physical controls
A) Use non-technical methods of preventing harm
B) Are the security measures built into the information system itself
C) Perform malicious tasks at the direction of a remote controller
D) Manipulate people into performing desired actions
Correct Answer:

Verified
Correct Answer:
Verified
Q5: Denial of service refers to<br>A) Programs that
Q6: Zombies are<br>A) Software used to hide the
Q7: Assets are<br>A) Resources or information that is
Q8: The NVD database<br>A) Describes likely impacts and
Q9: A cross-site scripting vulnerability can occur when<br>A)
Q11: Threats are<br>A) Safeguards used to minimize the
Q12: Controls are<br>A) Safeguards used to minimize the
Q13: Rootkits are<br>A) Software used to hide the
Q14: Zero-day exploits are<br>A) Software used to hide
Q15: As reported in the chapter, recent trends