Which of the following is NOT an accepted classification of security controls?
Question No 2
Which three of the following characteristics form the AAA Triad in Information Security?
1. Authentication
2. Availability
3. Accounting
4. Asymmetry
5. Authorisation
Question No 3
According to ISO/IEC 27000, which of the following is the definition of a vulnerability?
Question No 4
Which term describes the acknowledgement and acceptance of ownership of actions, decisions,
policies and deliverables?
Question No 5
Which security concept provides redundancy in the event a security control failure or the
exploitation of a vulnerability?