- What are the three components of the CIA triad?
- Why might a CCTV camera be sited outside a building without any film inside?
- What does confidentiality mean?
- How can we protect a data center from people entering it?
- What is the purpose of an air gap?
- Name three administrative controls.
- Name three physical controls.
- Following an incident, what type of control will be used when researching how the incident happened?
- How do I know if the integrity of my data is intact?
- What is a corrective control?
- What is the purpose of hashing?
- If I hash the same data with different SHA1 applications, what will the output be?
- What two things does HMAC provide?
- What type of control is it when I change the firewall rules?
- What is used to log in to a system that works in conjunction with a PIN?
- What is the name of the person who looks after classified data and who is the person that gives people access to the classified data?
- When you use a DAC model for access, who determines who gains access to the data?
- What is least privilege?
- What access control method does SELinux utilize?
- What is the Linux permission of 777? What access does it give you?
- What does the Linux permission execute allow me to do?
- The sales team are allowed to log in to the company between 9 a.m. and 10 p.m. What type of access control is being used?
- Two people from the finance team are only allowed to authorize the payment of checks; what type of access control are they using?
- What is the purpose of the defense in depth model?
- When someone leaves the company what is the first thing we should do with their user account?