Q&A
1: | Which resources in a network are considered the most trusted? |
2: | List five types of malware. |
3: | What is a hoax? |
4: | What is the difference between a hacker and a cracker? |
5: | Attacks often come from inside your organization. List three potential threats from inside an organization. |
6: | Who is involved in the security process of an organization? |
7: | Name two legal requirements made by government agencies. |
8: | What is CIA? |
9: | What is SLE? |
10: | What is ALE? |