The main goal of 'Defense in Depth' is **b. Provide multiple layers of security**. This approach involves implementing various security measures at different levels to protect information and systems more effectively.
c. Online installations
A 'Click-through license' is commonly found in online installations, where users must agree to the terms of the license by clicking a button before they can proceed with the installation or use of the software.
The first step in threat modeling is **c. Identify scope**. This involves determining what assets, systems, or applications you are focusing on, which is crucial for identifying potential threats and vulnerabilities later in the process.
The correct answer is: **c. Align security with business objectives**.
The Chief Information Security Officer (CISO) is responsible for the overall security strategy and implementation within an organization, ensuring that security measures align with business goals and objectives, managing risks, and leading efforts to protect the company’s information assets.
The correct answer is **c. Shrink-wrap license**. This type of license is associated with software that is packaged in a way that indicates agreement to the license terms is granted when the package is opened.
The correct answer is **c. Technical**.
Technical controls are primarily logical and software-based, involving protection mechanisms implemented through technology, such as encryption, firewalls, and intrusion detection systems.
The correct answer is: **b. Behavioral expectation to act responsibly**.
"Due care" refers to the level of judgment, attention, and responsibility that one is expected to exercise in a particular situation. In a legal and ethical context, it often pertains to the obligation to ensure that actions taken and decisions made do not cause harm to others.
b. An employee clicking a phishing link
A threat actor refers to an individual or entity that poses a threat to an organization's security, typically by engaging in malicious activity. An employee clicking a phishing link can be considered a threat actor, as their action may open the door for potential security breaches. In contrast, a password, antivirus program, and firewall serve protective roles rather than acting as threats.
In the context of cybersecurity, 'Seclusion' typically refers to the concept of keeping certain data or systems isolated from unauthorized access or exposure. The closest option that aligns with this definition is:
**b. Storing something in a hidden location**
This means keeping sensitive information secured and out of reach from unauthorized users or threats.
b. Advise or mandate actions to influence behavior
'Directive Control' refers to security measures that provide guidance on how to conduct activities in order to manage risks and influence behavior in a desired direction.
The term 'Control Gap' in risk management refers to:
**c. Portion of risk not covered by controls**
A control gap indicates areas where existing controls do not sufficiently mitigate identified risks, leaving an organization's operations exposed to potential threats.
The key purpose of a security 'procedure' is:
**c. Step-by-step implementation instructions**
Procedures are designed to provide specific, detailed steps that must be followed to ensure compliance with security policies and to effectively manage security risks.
c. Substitutes for primary control that cannot be implemented
Compensating controls are alternative measures put in place to meet a security requirement when the primary control cannot be implemented effectively.
The primary security concern with 'Data in Transit' is **c. Interception and tampering**. This refers to the risk that data being transmitted over networks can be intercepted by unauthorized parties or altered during transmission, potentially leading to breaches of confidentiality and integrity.
c. MBR Virus
An MBR (Master Boot Record) virus specifically targets and infects the master boot record of a storage device, which is crucial for the booting process of an operating system.
The main purpose of a 'baseline' in security documentation is:
**b. Sets minimum acceptable security levels**
A baseline establishes the minimum standards and requirements for security measures within an organization, helping to ensure compliance and consistency in security practices.