This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: the effect on other elements. a. What-if b. What-else c. What-now d. What-next 6. The ____ method of risk control eliminates the risk by adding protective safeguards. a. avoidance b. transference c. mitigation d. acceptance 7. ____ encryption is symmetric, because a single key is used to encrypt and decrypt information. a. Network b. Public key c. Plain text d. Private key 8. ____ is a method of obtaining personal information under false pretenses. a. Pretraining b. Pretesting c. Pretexting d. Prequalifying 9. Backups are stored for a specific ____ after which they are either destroyed or the backup media is reused. a. incremental period b. retention period c. continuous period d. differential period 10. The term ____ relates to specific hardware and software skills that can be measured and verified by examination. a. certification b. metrics c. credentials d. log...
View Full Document
This note was uploaded on 01/30/2012 for the course CNIT 180 taught by Professor Victorbarlow during the Spring '12 term at Purdue University-West Lafayette.
- Spring '12