Match each item with an statement below:
A. a valuable tool used in threat modeling.
B. the lifeblood of an organization.
C. probability that a risk will occur in a particular year.
D. final step in identifying risks.
E. encourage members of professional groups to adhere to strict ethical behavior within their profession.
F. document that outlines the specific rules that must be met in order to keep the WLAN secure.
G. defines what actions the users of a system may perform while using the wireless network.
H. proportion of an asset's value that is likely to be destroyed by a particular risk.
I. never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
A. Attack tree
B. Data
C. Annualized Rate of Occurrence (ARO)
D. Risk assessment
E. Code of ethics
F. Security policy
G. Acceptable use policy (AUP)
H. Exposure Factor (EF)
I. Security policy cycle
You might also like to view...
A queue is a __________ data structure.
a) FOFI b) FIFO c) OFIF d) IFOF
In a JavaFX CSS style definition, if a selector name starts with a period, that selector corresponds to a __________.
a. value entered by the user b. specific JavaFX node c. named color d. specific variable in the application
What's the main purpose of a firewall?
a. Control traffic entering and leaving a network b. Prevent certain applications from running c. Protect internal network segments d. Prevent command and control data from being initiated from inside the network.
Data at the front of the queue can be retrieved with the _____ operation.
A. front B. top C. queue front D. peek