Question 11

What does a penetration test do that a Vulnerability Scan does NOT?
  • Question 12

    As well as being permitted to access, create, modify and delete information, what right does an Information Owner NORMALLY have in regard to their information?
  • Question 13

    In terms of security culture, what needs to be carried out as an integral part of security by all members of an organisation and is an essential component to any security regime?
  • Question 14

    What type of attack attempts to exploit the trust relationship between a user client based browser and server based websites forcing the submission of an authenticated request to a third party site?
  • Question 15

    Which of the following statements relating to digital signatures is TRUE?