J Garner
Quiz von , erstellt am more than 1 year ago

1 Security X Quiz am Section 1 - Test, erstellt von J Garner am 04/08/2018.

35
2
0
J Garner
Erstellt von J Garner vor fast 6 Jahre
Schließen

Section 1 - Test

Frage 1 von 28

1

Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?

Wähle eine der folgenden:

  • Board of directors

  • Executive committee

  • Cybersecurity management

  • Cybersecurity practitioners

Erklärung

Frage 2 von 28

1

Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?

Wähle eine oder mehr der folgenden:

  • Encrypt

  • Protect

  • Investigate

  • Recover

  • Identify

Erklärung

Frage 3 von 28

1

Which of the following is the best definition for cybersecurity?

Wähle eine der folgenden:

  • The process by which an organization manages cybersecurity risk to an acceptable level

  • The protection of information from unauthorized access or disclosure

  • The protection of paper documents, digital and intellectual property, and verbal or visual communications

  • Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems

Erklärung

Frage 4 von 28

1

Three common controls used to protect the availability of information are:

Wähle eine der folgenden:

  • redundancy, backups and access controls.

  • encryption, file permissions and access controls.

  • access controls, logging and digital signatures.

  • hashes, logging and backups

Erklärung

Frage 5 von 28

1

Select all that apply. Governance has several goals, including:

Wähle eine oder mehr der folgenden:

  • providing strategic direction.

  • ensuring that objectives are achieved.

  • verifying that organizational resources are being used appropriately.

  • directing and monitoring security activities.

  • ascertaining whether risk is being managed properly

Erklärung

Frage 6 von 28

1

The protection of assets from ________ is a primary concern for security in general.

Wähle eine der folgenden:

  • breaches

  • malware

  • threats

  • controls

Erklärung

Frage 7 von 28

1

Select all that apply - With respect to technology, many factors can impact security, such as:

Wähle eine oder mehr der folgenden:

  • Level of IT complexity

  • Network connectivity (e.g., internal, third-party, public)

  • Specialist industry devices/instrumentation

  • Nature of business

  • Platforms, applications and tools used

  • Industry-specific compliance requirements and regulations

  • Operational support for security

Erklärung

Frage 8 von 28

1

Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:

Wähle eine oder mehr der folgenden:

  • Nature of business

  • Risk tolerance

  • Risk assessments

  • Operational support for security

  • Security mission, vision and strategy

  • Industry alignment and security trends

Erklärung

Frage 9 von 28

1

_______________ deals with information, regardless of its format—it encompasses paper documents, digital
and intellectual property in people’s minds, and verbal or visual communications.

Wähle eine der folgenden:

  • Information security

  • Cybersecurity

Erklärung

Frage 10 von 28

1

______________ deals with with protecting digital assets—everything encompassed within network hardware, software
and information that is processed, stored within isolated systems or transported by internetworked information
environments.

Wähle eine der folgenden:

  • Information Security

  • Cybersecurity

Erklärung

Frage 11 von 28

1

This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.

Wähle eine der folgenden:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Erklärung

Frage 12 von 28

1

This term helps design safeguards to limit the impact of potential events on critical services and infrastructure

Wähle eine der folgenden:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Erklärung

Frage 13 von 28

1

Implement activities to identify the occurrence of a cybersecurity event.

Wähle eine der folgenden:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Erklärung

Frage 14 von 28

1

Take appropriate action after learning of a security event.

Wähle eine der folgenden:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Erklärung

Frage 15 von 28

1

Plan for resilience and the timely repair of compromised capabilities and services.

Wähle eine der folgenden:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Erklärung

Frage 16 von 28

1

___ is the protection of information from unauthorized access or disclosure

Wähle eine der folgenden:

  • Confidentiality

  • Integrity

  • Availability

Erklärung

Frage 17 von 28

1

___ is the protection of information from unauthorized modification.

Wähle eine der folgenden:

  • Confidentiality

  • Integrity

  • Availability

Erklärung

Frage 18 von 28

1

___ ensures the timely and reliable access to and use of information and systems.

Wähle eine der folgenden:

  • Confidentiality

  • Integrity

  • Availability

Erklärung

Frage 19 von 28

1

Personal, financial and medical information require a higher degree of ___ than the minutes of a staff
meeting.

Wähle eine der folgenden:

  • Confidentiality

  • Integrity

  • Availability

Erklärung

Frage 20 von 28

1

The ___ of digital information can be maintained using several different means, including access controls, file
permissions and encryption.

Wähle eine der folgenden:

  • Confidentiality

  • Integrity

  • Availability

Erklärung

Frage 21 von 28

1

If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:

Wähle eine der folgenden:

  • Confidentiality

  • Integrity

  • Availability

Erklärung

Frage 22 von 28

1

The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.

Wähle eine der folgenden:

  • Confidentiality

  • Integrity

  • Availability

Erklärung

Frage 23 von 28

1

___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning

Wähle eine der folgenden:

  • Confidentiality

  • Integrity

  • Availability

Erklärung

Frage 24 von 28

1

___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.

Wähle eine der folgenden:

  • Board of Directors

  • Executive Management

  • Senior Information Security Managment

  • Cybersecurity Practitioners

Erklärung

Frage 25 von 28

1

The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).

Wähle eine der folgenden:

  • Board of Directors

  • Executive Management

  • Senior Information Security Management

  • Cybersecurity Practitioners

Erklärung

Frage 26 von 28

1

Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:

Wähle eine oder mehr der folgenden:

  • Developing the security strategy

  • Overseeing the security program and initiatives

  • Coordinating with business process owners for ongoing alignment

  • Ensuring that risk and business impact assessments are conducted

  • Implement and manage processes and technical controls

Erklärung

Frage 27 von 28

1

Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and
network security specialists.

Wähle eine der folgenden:

  • Board of Directors

  • Executive Management

  • Senior Information Security Management

  • Cybersecurity Practitioners

Erklärung

Frage 28 von 28

1

What is the correct order of Cybersecurity Roles from Top to bottom

Wähle eine der folgenden:

  • 1. Board of Directors
    2. Senior Information Security Management
    3. Executive Management
    4. Cybersecurity Practitioners

  • 1. Board of Directors
    2. Executive Management
    3. Senior Information Security Management
    4. Cybersecurity Practitioners

Erklärung