AppendixAnswer Key
Lesson 1: Understanding Security Layers
Answers to Knowledge Assessment
Multiple Choice
- a, b, d
- a, c, d
- b, d
- a
- c
- a, d
- c
- b
- d
- a
- a
Fill in the Blank Answers
- Confidentiality
- access control
- defense in depth
- threat
- risk register
- Social engineering
- integrity
- keylogger
- Residual risk
- cost
Matching and Identification
- S Spoofing
- T Tampering
- R Repudiation
- I Information Disclosure
- D Denial-of-Service
- E Elevation of Privilege
Build List
- 2 Create an architecture overview.
- 1 Identify assets.
- 6 Rate the threats.
- 3 Decompose the security components and applications.
- 4 Identify the threats.
- 5 Document the threats.
Answers to Business Case Scenarios
Scenario 1-1: Designing a Physical Security Solution ...
Get Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.