Analyst B has discovered unauthorized access to data. What has she discovered?
An internet-based organization whose address is not known has attempted to acquire personal identification details such as usernames and passwords by creating a fake website. This is an example of?
Which organizational area would drive a cybersecurity infrastructure Business Case?
A significant benefit of role-based access is that it:
The process by which organizations assess the data they hold and the level of protection it should be given based on its risk to loss or harm from disclosure, is known as:
What operational practice would risk managers employ to demonstrate the effectiveness of security controls?
What term is defined as a fix to software programming errors and vulnerabilities?
If a threat is expected to have a serious adverse effect, according to NIST SP 800-30 it would be rated with a severity level of:
When attackers exploit human emotions and connection to gain access, what technique are they using?
What is defined as an internal computerized table of access rules regarding the levels of computer access permitted to login IDs and computer terminals?
TESTED 05 Apr 2026