A user with limited permissions to perform job tasks
What is the main advantage of using a passphrase over a traditional password?
Easier to remember and more secure
What does "Availability" in the CIA Triad ensure?
Information is readily available to authorized users
Why are computers considered high-value targets?
They are expensive and store valuable data
What should companies do to ensure physical security of servers?
Keep servers in a locked room
What is Implicit Denial?
No one gets access unless specifically allowed
What do biometrics use to perform authentication of identity?
Special traits each person has
What does "Integrity" in the CIA Triad guarantee?
Information is stored and transferred as intended
If you want suggestions about local restaurants, what needs to be enabled in your browser?
Location Tracking
What is the purpose of two-factor authentication (2FA)?
To add an extra step to logging in for increased security
What is a system that allows a user to authenticate once to access multiple services?
Single Sign-On (SSO)
What is a pattern lock?
A predefined design on a touchscreen
What does the "C" in the CIA Triad stand for?
Confidentiality
What does "Non-repudiation" mean?
A person cannot deny their actions
What is authorization?
The process of determining what rights and privileges a particular entity has
What is Execute permission?
Allows a user to run a program or script from a file.
Which of the following is an example of "Something You Have"?
Hardware token
Username
Security question
Password
Hardware token
What is the most basic part of cybersecurity?
Controlling physical access to computers and network devices
What is Authentication?
The process of ensuring that each account is only operated by its proper user
Which rule states that a user should only get the access they need to do their job and nothing more?
Least Privilege
What is Write permission?
Allows a user to modify or edit a file
Which type of user account can do anything they want on the entire computer system?
Administrator
What is the main purpose of setting permissions on files and folders?
To control who can access and modify them
What is accounting in the context of computer systems?
The process of documenting user actions on the computer system.
What is the purpose of the NIST Cybersecurity Framework?
To develop security policies and capabilities