Question 1
Meeting which of the following security objectives BEST ensures that information is protected against unauthorized modification?
Question 2
Most security vulnerabilities in software exit because:
Question 3
Which of the following would present the GREATEST risk to information security?
Question 4
For virtual private network (VPN) access to the corporate network, the information security manager is requiring strong authentication. Which of the following is the strongest method to ensure that logging onto the network is secure?
Question 5
Which of the following is the responsibility of a data owner?