Which of the following is NOT considered to be a form of computer misuse?
Correct Answer:
A
What term is used to describe the act of checking out a privileged account password in a manner that bypasses normal access controlsprocedures during a critical emergency situation?
Correct Answer:
C
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Correct Answer:
D
https://en.wikipedia.org/wiki/Defense_in_depth_(computing)
A system administrator has created the following "array" as an access control for an organisation. Developers: create files, update files.
Reviewers: upload files, update files.
Administrators: upload files, delete fifes, update files. What type of access-control has just been created?
Correct Answer:
C
When undertaking disaster recovery planning, which of the following would NEVER be considered a "natural" disaster?
Correct Answer:
B