- Fill in the blank. A computer ______ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
- Your best defense against someone guessing your password is to be smart about how you choose and use your password. a) True. b)False.
- What does an effective penetration test consist of? Explain.
- What is the most secure operating system? Windows, Mac, Linux, android iOS or Apple iOS? And why?
- What are the risks associated with more applications running on fewer physical servers than in a traditional data center?
- (a) What is threat modeling? (b) What is stride? (c) Provide an example of how organizations use stride in threat modeling.
- Discuss the three main areas of accountability(IT security, information security, and Enterprise security) regarding information security. Provide an example for each area.
- How information security risk management is important in the development of corporate strategy?
- What is active reconnaissance?