Questions
Now, it’s time to check your knowledge. Select the best response, and then check your answers, found in the Assessment section at the end of the book.
- _____ limits access to intangible assets, such as files, networks, websites, or applications, and includes ACLs along with folder and file permissions.
a. Physical access controls
b. Logical access controls
c. Turing measurements
d. GDPR clipping levels
- When we protect data from unauthorized changes, we are ensuring _____.
a. Integrity
b. Confidentiality
c. Availability
d. Non-repudiation
- When we use a _____ instead of a credit card during a transaction, this can prevent the payment database from being compromised.
a. Token
b. Haptic
c. GDPR
d. ACL
- _____ requires two or more authentication factors, such as a password and a biometric scan, and can improve the security of a device.
a. Tokens
b. Haptic
c. GDPR
d. MFA
- _____ is an industry standard that outlines requirements to secure credit card transactions...