I get to create a virtual chocolate product as my final project.
Blog
FDSCTE 1110 is a 1 credit course that teaches you about all…
FDSCTE 1110 is a 1 credit course that teaches you about all things chocolate.
The sample sets of chocolates are created with a theme in mi…
The sample sets of chocolates are created with a theme in mind.
Weaknesses or gaps in the protection of assets that can be e…
Weaknesses or gaps in the protection of assets that can be exploited by Threats in order to compromise the asset.
Which is the risk analysis method that applies a subjective…
Which is the risk analysis method that applies a subjective assessment of risk occurrence likelihood (probability) against the potential severity of the risk outcomes (impact) to determine the overall severity of a risk?
Auditing is the process to determine if a user’s credentials…
Auditing is the process to determine if a user’s credentials are authorized to access a network resource.
Which of these is the process to determine if the credential…
Which of these is the process to determine if the credentials given by a user or another system are authorized to access the network resource in question?
Someone who gains access to a system and causes harm is a __…
Someone who gains access to a system and causes harm is a _____
Your company is instituting a new security awareness program…
Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threats, including social engineering. Which of the following best defines social engineering?
What is the name of the assessment that you must perform bef…
What is the name of the assessment that you must perform before you create your BCP (business continuity plan)?