Multiple Choice
Controls are _____.
A) weaknesses in an information system that can be exploited to compromise information security
B) capabilities,intentions and methods of adversaries to compromise information security
C) measures taken to mitigate the dangers from information security threats
D) restrictions on information to protect personal privacy
Correct Answer:

Verified
Correct Answer:
Verified
Q1: In network security,a firewall is a device
Q2: The limitations of firewalls include all the
Q4: Most commercial encryption technologies such as SSL
Q5: Authorization is _.<br>A)hiding information<br>B)providing an alternate identity<br>C)the
Q6: Vulnerabilities are _.<br>A)weaknesses in an information system
Q7: Confidentiality is defined as _.<br>A)guarding against improper
Q8: Authentication is _.<br>A)hiding information<br>B)providing an alternate identity<br>C)the
Q9: Encryption is the process of _.<br>A)rendering information
Q10: All the following are properties of asymmetric
Q11: Information security controls are commonly classified in