What are the steps in the business continuity planning process? Why is a clear understanding of a
companys enterprise architecture critical to this process?
Response: A business recovery plan is a very important aspect of any business, especially consider
What benefit do digital signatures provide and what are their characteristics? In your own words, what
does non-repudiation mean?
Response: The implementation and require use of digital signatures is extremely important. This is a
bottleneck bit of elimin
Describe three of the following attack types in the Operation Security domain: man-in-the-middle, mail
bombing, war-dialing, ping-of-death, teardrop, and slamming-and-cramming
War-dialing is a technique of using a modem to automatically scan a list of tel
What are the different Access Control Models available to secure access to resources? Give an
example of one that you have used in a work situation or if that is not possible, one that youve read
Enterprise network can often contain diverse stor
Describe the following threats to the application environment: Buffer Overflow, Denial of Service, Time of
Check/Time of Use, Malformed input attacks, Object reuse, Garbage collection, and Trap door.
Buffer Over flow is essentially when receivers are over
There are malicious threats that always try to find the cracks in the physicality of a security system.
Although it is easier for hackers to attack a system over cyber, physical threats still occur and can be
stopped. Identifying the main threats to netwo
In your own words describe what is meant by defense-in-depth in security design. Give
an example of a combination of security controls that you have seen implemented that show how
the combination of security factors improve the overall security.