Review Questions
Now it's time to check your knowledge. Answer the questions, then check your answers, found in the Solutions section at the end of the book:
- What is a vulnerability in relation to risk management?
- What is the purpose of BPA?
- What is a multiparty risk?
- What is IP theft?
- What is the difference between an MOU and an MOA?
- What is tokenization and why is it stronger than encryption?
- One of the junior members of the IT team installs more copies of a piece of software than are allowed by the licenses that the company has purchased. What have they just carried out?
- What is the purpose of an ISA?
- How does the shadow IT threat actor operate and what type of attack could benefit from their actions?
- What is an inherent risk?
- What are the four stages of the information life cycle?
- Why would you use STIX\TAXII?
- What is the benefit of introducing a separation of duties in the finance department?
- What is the...