Question 11
What does a penetration test do that a Vulnerability Scan does NOT?
Question 12
As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
Question 13
In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
Question 14
What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
Question 15
Which of the following statements relating to digital signatures is TRUE?