Which of the following is a temporary approval to operate based on an assessment of the implementation status of the assigned IA Controls?
Correct Answer:C
Shoulder surfing is a type of in-person attack in which the attacker gathers information about the premises of an organization. This attack is often performed by looking surreptitiously at the keyboard of an employee's computer while he is typing in his password at any access point such as a terminal/Web site. Which of the following is violated in a shoulder surfing attack?
Correct Answer:D
Wendy is about to perform qualitative risk analysis on the identified risks within her project. Which one of the following will NOT help Wendy to perform this project management activity?
Correct Answer:A
According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:ABC
Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?
Correct Answer:B
Which of the following processes has the goal to ensure that any change does not lead to reduced or compromised security?
Correct Answer:A