Ensuring the correctness of data inputted to a system is an example of which facet of information security?
Correct Answer:
B
Which security concept provides redundancy in the event a security control failure or the exploitation of a vulnerability?
Correct Answer:
D
https://en.wikipedia.org/wiki/Defense_in_depth_(computing)
James is working with a software programme that completely obfuscates the entire source code, often in the form of a binary executablemaking it difficult to inspect, manipulate or reverse engineer the original source code.
What type of software programme is this?
Correct Answer:
C
What aspect of an employee's contract of employment Is designed to prevent the unauthorised release of confidential data to third parties evenafter an employee has left their employment?
Correct Answer:
B
When handling and investigating digital evidence to be used in a criminal cybercrime investigation, which of the following principles isconsidered BEST practice?
Correct Answer:
D