- Which of the following is not a commonly used identification factor of access control?
- Group
- Role or assignment
- Application type
- Computer name
- The permissions and rights assigned to a specific user or group are defined in what element?
- ACL
- ACX
- ACE
- ACR
- The application of a cryptographic algorithm to data for the purpose of restricting access to its content is what?
- Confidentiality
- Authentication
- Authorization
- Encryption
- Which of the following is a method for removing data from a disk drive?
- Delete
- Wipe
- Erase
- Shred
- All the above
- None of the above
- Which of the following describes the status of any data on a disk drive after formatting?
- Unrecoverable
- Destroyed
- Recoverable
- Unreadable
- What is the objective of hardening a system or device?
- Extending service life
- Strengthening its case
- Reducing vulnerability
- Taking it offline
- Application hardening...