BUISENESS MANAGEMENT
RISK MANAGEMENT
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Spoofing
|
|
Repudiation
|
|
Tampering
|
|
Elevation of privilege
|
Detailed explanation-1: -The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability: The website can become slow to respond to legitimate requests. The website can be disabled entirely, making it impossible for legitimate users to access it.
Detailed explanation-2: -Defense in depth states that organizations should have overlapping security controls designed to meet the same security objectives whenever possible. This approach provides security in the event of a single control failure.
Detailed explanation-3: -Awareness establishes a minimum standard of information security understanding. It is designed to accommodate all personal of the organization staff regardless of their assigned tasks.
Detailed explanation-4: -Risk determination assesses threats and vulnerabilities to consider the likelihood that known threat sources will be able to exploit identified vulnerabilities to cause one or more adverse events and the consequences if such events occur.