What is the CIA triangle?
Answer / chaitanya
Confidentiality, Integrity, Availability. As close to a ‘code’ for Information Security as it is possible to get, it is the boiled down essence of InfoSec. Confidentiality- keeping data secure. Integrity- keeping data intact. Availability- keeping data accessible.
| Is This Answer Correct ? | 0 Yes | 0 No |
Why would you want to use SSH from a Windows pc?
A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?
I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?
How would you compromise an “Office Workstation” at a hotel?
You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?
What is the difference between a Black Hat and a White Hat?
On a Windows network, why is it easier to break into a local account than an AD account?
What is the difference between a vulnerability and an exploit?
What is a spooler on a computer?
What is your opinion on hacktivist groups such as Anonymous?
You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?
How do you protect your home Wireless Access Point?