What are the different methods that can be used as access controls?
1. Detective.
2. Physical.
3. Reactive.
4. Virtual.
5. Preventive.
Which of the following statements relating to digital signatures is TRUE?
When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?
What form of training SHOULD developers be undertaking to understand the security of the code they have written and how it can improve security defence whilst being attacked?
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
What form of risk assessment is MOST LIKELY to provide objective support for a security Return on Investment case?
In software engineering, what does 'Security by Design” mean?
Which algorithm is a current specification for the encryption of electronic data established by NIST?
When seeking third party digital forensics services, what two attributes should one seek when making a choice of service provider?
Which of the following controls would be the MOST relevant and effective in detecting zero day attacks?