Section 1 - Test

Beschreibung

1 Security X Quiz am Section 1 - Test, erstellt von J Garner am 04/08/2018.
J Garner
Quiz von J Garner, aktualisiert more than 1 year ago
J Garner
Erstellt von J Garner vor fast 6 Jahre
35
2

Zusammenfassung der Ressource

Frage 1

Frage
Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?
Antworten
  • Board of directors
  • Executive committee
  • Cybersecurity management
  • Cybersecurity practitioners

Frage 2

Frage
Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?
Antworten
  • Encrypt
  • Protect
  • Investigate
  • Recover
  • Identify

Frage 3

Frage
Which of the following is the best definition for cybersecurity?
Antworten
  • The process by which an organization manages cybersecurity risk to an acceptable level
  • The protection of information from unauthorized access or disclosure
  • The protection of paper documents, digital and intellectual property, and verbal or visual communications
  • Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems

Frage 4

Frage
Three common controls used to protect the availability of information are:
Antworten
  • redundancy, backups and access controls.
  • encryption, file permissions and access controls.
  • access controls, logging and digital signatures.
  • hashes, logging and backups

Frage 5

Frage
Select all that apply. Governance has several goals, including:
Antworten
  • providing strategic direction.
  • ensuring that objectives are achieved.
  • verifying that organizational resources are being used appropriately.
  • directing and monitoring security activities.
  • ascertaining whether risk is being managed properly

Frage 6

Frage
The protection of assets from ________ is a primary concern for security in general.
Antworten
  • breaches
  • malware
  • threats
  • controls

Frage 7

Frage
Select all that apply - With respect to technology, many factors can impact security, such as:
Antworten
  • Level of IT complexity
  • Network connectivity (e.g., internal, third-party, public)
  • Specialist industry devices/instrumentation
  • Nature of business
  • Platforms, applications and tools used
  • Industry-specific compliance requirements and regulations
  • Operational support for security

Frage 8

Frage
Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:
Antworten
  • Nature of business
  • Risk tolerance
  • Risk assessments
  • Operational support for security
  • Security mission, vision and strategy
  • Industry alignment and security trends

Frage 9

Frage
_______________ deals with information, regardless of its format—it encompasses paper documents, digital and intellectual property in people’s minds, and verbal or visual communications.
Antworten
  • Information security
  • Cybersecurity

Frage 10

Frage
______________ deals with with protecting digital assets—everything encompassed within network hardware, software and information that is processed, stored within isolated systems or transported by internetworked information environments.
Antworten
  • Information Security
  • Cybersecurity

Frage 11

Frage
This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.
Antworten
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Frage 12

Frage
This term helps design safeguards to limit the impact of potential events on critical services and infrastructure
Antworten
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Frage 13

Frage
Implement activities to identify the occurrence of a cybersecurity event.
Antworten
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Frage 14

Frage
Take appropriate action after learning of a security event.
Antworten
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Frage 15

Frage
Plan for resilience and the timely repair of compromised capabilities and services.
Antworten
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Frage 16

Frage
___ is the protection of information from unauthorized access or disclosure
Antworten
  • Confidentiality
  • Integrity
  • Availability

Frage 17

Frage
___ is the protection of information from unauthorized modification.
Antworten
  • Confidentiality
  • Integrity
  • Availability

Frage 18

Frage
___ ensures the timely and reliable access to and use of information and systems.
Antworten
  • Confidentiality
  • Integrity
  • Availability

Frage 19

Frage
Personal, financial and medical information require a higher degree of ___ than the minutes of a staff meeting.
Antworten
  • Confidentiality
  • Integrity
  • Availability

Frage 20

Frage
The ___ of digital information can be maintained using several different means, including access controls, file permissions and encryption.
Antworten
  • Confidentiality
  • Integrity
  • Availability

Frage 21

Frage
If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:
Antworten
  • Confidentiality
  • Integrity
  • Availability

Frage 22

Frage
The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.
Antworten
  • Confidentiality
  • Integrity
  • Availability

Frage 23

Frage
___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning
Antworten
  • Confidentiality
  • Integrity
  • Availability

Frage 24

Frage
___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.
Antworten
  • Board of Directors
  • Executive Management
  • Senior Information Security Managment
  • Cybersecurity Practitioners

Frage 25

Frage
The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).
Antworten
  • Board of Directors
  • Executive Management
  • Senior Information Security Management
  • Cybersecurity Practitioners

Frage 26

Frage
Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:
Antworten
  • Developing the security strategy
  • Overseeing the security program and initiatives
  • Coordinating with business process owners for ongoing alignment
  • Ensuring that risk and business impact assessments are conducted
  • Implement and manage processes and technical controls

Frage 27

Frage
Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and network security specialists.
Antworten
  • Board of Directors
  • Executive Management
  • Senior Information Security Management
  • Cybersecurity Practitioners

Frage 28

Frage
What is the correct order of Cybersecurity Roles from Top to bottom
Antworten
  • 1. Board of Directors 2. Senior Information Security Management 3. Executive Management 4. Cybersecurity Practitioners
  • 1. Board of Directors 2. Executive Management 3. Senior Information Security Management 4. Cybersecurity Practitioners
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

GCSE AQA Chemistry - Unit 1
James Jolliffe
Topic 1 Quiz - Elements & The Periodic Table
Musicdudejoe
Tourism 1
Scott Church
AQA Business Unit 1
lauren_binney
Chapter 3
Ryan Tram
Chapter 2
Ryan Tram
Coastlines 2
Scott Church
Chapter 4
Ryan Tram
Chapter 8
Ryan Tram
Chapter 6
Ryan Tram
Chapter 5
Ryan Tram