Which one of the following is not one of the canons of the (ISC)2 code of ethics?
Avoid any activity that may be perceived as malicious.
What security control provides non-repudiation for messages?
digital signatures
Which one of the following is an example of multifactor authentication?
ID card and PIN
What law regulates the protection of health information?
HIPAA
What security tool can be configured to prevent DDoS attacks?
firewall
Your organization requires that passwords contain a mixture of uppercase characters, lowercase characters, digits, and symbols. What type of password policy is this?
complexity
During what phase of the access control process does a user prove his or her identity?
authentication
In what type of attack does the attacker capture and then reuse login information?
replay attack
What is the best defense against dumpster diving attacks?
shredding
Purchasing an insurance policy is an example of which risk management strategy?
risk transference
What two factors are used to evaluate a risk?
1. likelihood and impact
2. criticality and likelihood
3. impact and criticality
4. frequency and likelihood
likelihood and impact
What term best describes making a snapshot of a system or application at a point in time for later comparison?
baselining
What type of security control is designed to stop a security issue from occurring in the first place?
preventive
What term describes risks that originate inside the organization?
internal