Which term represents a potential danger that could take advantage of a weakness in a system?
Which term represents a potential danger that could take advantage of a weakness in a system?
The correct term for a potential danger that could take advantage of a weakness in a system is 'threat.' A threat is any circumstance or event with the potential to cause harm by exploiting vulnerabilities in a system.
In computer security, which information is the term PHI used to describe?
PHI stands for Protected Health Information, which refers to any information in a medical record that can be used to identify an individual and that was created, used, or disclosed in the course of providing a health care service such as diagnosis or treatment.
Based on which statement does the discretionary access control security model grant or restrict access?
Discretionary Access Control (DAC) is a type of access control where the owner of the object (such as a file or database) determines who has access to it. Access is granted or restricted based on the security policy set by the owner of the object. This model gives the owner discretion over who can access and manipulate their data.
One of the objectives of information security if to protect the CIA of information and systems. What does CIA mean in this context?
In the context of information security, CIA stands for Confidentiality, Integrity, and Availability. Confidentiality ensures that information is accessible only to those authorized to have access, integrity maintains the accuracy and completeness of the information, and availability ensures that information is accessible to authorized users when needed.
Which two activities are examples of social engineering? (Choose two.)
Social engineering involves manipulating people into revealing confidential information or performing actions that compromise security. Receiving a call from the IT department asking you to verify your username/password is an example of social engineering, as it involves a person trying to manipulate another into revealing sensitive information. Similarly, receiving an email from HR requesting that you visit a secure HR website to update your contract information is another example, as it is an attempt to deceive the recipient into disclosing personal details. Both scenarios involve exploiting human trust and elements of deception to gain access to sensitive information.