LS 1.1.8

A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security goals is most at risk?
Smart phones with cameras and Internet capabilities pose a risk to which security goal?
By definition, which security concept ensures that only authorized parties can access data?
In this example, what protection does the hashing activity provide?
Which of the following is an example of an internal threat?
A user accidentally deletes the new product designs
What is the greatest threat to the confidentiality of data in most secure organizations?
USB devices
Which of the following is the correct definition of a threat?
Any potential danger to the confidentiality, integrity, or availability of information or systems.
Which of the following is an example of a vulnerability?
Misconfigured Server
Which of the following is NOT a valid concept to associate with integrity?
Control access to resources to prevent unwanted access
When a cryptographic system is used to protect the confidentiality of data, what is actually protected?
Unauthorized users are prevented from viewing or accessing the resource
By definition, which security concept uses the ability to prove that a sender sent an encrypted messages?
The back up solution imposed on this network is designed to provide protection for what security service?