Читать книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple - Страница 152
Written Lab
Оглавление1 Name six different administrative controls used to secure personnel.
2 What are the basic formulas or values used in quantitative risk assessment?
3 Describe the process or technique used to reach an anonymous consensus during a qualitative risk assessment.
4 Discuss the need to perform a balanced risk assessment. What are the techniques that can be used and why is this necessary?
5 What are the main types of social engineering principles?
6 Name several types or methods of social engineering.