User Domain 10 Questions

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

USER DOMAIN 10 QUESTIONS

MEMBERS:

 JOSHUA HERNANDEZ
 BRENNEY LAINE NAMOL
 KARLA FRANCES DANGUILAN
 MARK RYAN ARAO
 CZYROUNE BLAKE SANCHEZ

1. How does the principle of confidentiality apply to user domains?


a. By encrypting all user data
b. By ensuring that user data is only accessed by authorized personnel
c. By deleting all user data after a certain period
d. By making user data publicly accessible How does data validation contribute to maintaining data integrity?
2. How can users be prevented from modifying data they are not authorized to change?
a. By allowing all users to freely modify any data
b. By implementing strict access controls and permissions
c. By making all data read-only
d. By not storing any data
3. What is a common method for ensuring the integrity of user data in a domain?
a. Allowing unrestricted access to all users
b. Implementing regular data backups
c. Deleting all user data
d. Using weak passwords for user accounts
4. A type of threat where users may be tricked into divulging sensitive information or performing actions that
compromise security.
5. A type of threat where malicious or negligent actions by employees or contractors can lead to data breaches or system
compromises
6. A type of threat where attackers send deceptive emails to users to trick them into revealing sensitive information or
downloading malicious software
7. A type of vulnerability where users may not be aware of security best practices or the risks associated with certain
actions.
8. A type of vulnerability where users may not apply necessary security patches or updates, leaving systems vulnerable to
known exploits.
9. A type of vulnerability where it refers to the incorrect or suboptimal configuration of software, hardware, or network
settings. It can happen due to human error, oversight, or misunderstanding of the system's requirements.
10. A type of vulnerability where it refers to the absence of inadequacy of measures to protect physical assets, such as
buildings, equipment, and data storage devices, from unauthorized access, theft, damage, or interference.
ANSWERS:
1. B
2. B
3. B
4. Social Engineering
5. Malware
6. Phishing
7. Lack of Awareness
8. Patch Management Vulnerability
9. Misconfiguration
10. Lack of Physical Security

You might also like