Frage 1
Frage
Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?
Frage 2
Frage
Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?
Antworten
-
Encrypt
-
Protect
-
Investigate
-
Recover
-
Identify
Frage 3
Frage
Which of the following is the best definition for cybersecurity?
Antworten
-
The process by which an organization manages cybersecurity risk to an acceptable level
-
The protection of information from unauthorized access or disclosure
-
The protection of paper documents, digital and intellectual property, and verbal or visual communications
-
Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems
Frage 4
Frage
Three common controls used to protect the availability of information are:
Antworten
-
redundancy, backups and access controls.
-
encryption, file permissions and access controls.
-
access controls, logging and digital signatures.
-
hashes, logging and backups
Frage 5
Frage
Select all that apply. Governance has several goals, including:
Antworten
-
providing strategic direction.
-
ensuring that objectives are achieved.
-
verifying that organizational resources are being used appropriately.
-
directing and monitoring security activities.
-
ascertaining whether risk is being managed properly
Frage 6
Frage
The protection of assets from ________ is a primary concern for security in general.
Antworten
-
breaches
-
malware
-
threats
-
controls
Frage 7
Frage
Select all that apply - With respect to technology, many factors can impact security, such as:
Antworten
-
Level of IT complexity
-
Network connectivity (e.g., internal, third-party, public)
-
Specialist industry devices/instrumentation
-
Nature of business
-
Platforms, applications and tools used
-
Industry-specific compliance requirements and regulations
-
Operational support for security
Frage 8
Frage
Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:
Antworten
-
Nature of business
-
Risk tolerance
-
Risk assessments
-
Operational support for security
-
Security mission, vision and strategy
-
Industry alignment and security trends
Frage 9
Frage
_______________ deals with information, regardless of its format—it encompasses paper documents, digital
and intellectual property in people’s minds, and verbal or visual communications.
Antworten
-
Information security
-
Cybersecurity
Frage 10
Frage
______________ deals with with protecting digital assets—everything encompassed within network hardware, software
and information that is processed, stored within isolated systems or transported by internetworked information
environments.
Antworten
-
Information Security
-
Cybersecurity
Frage 11
Frage
This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.
Antworten
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Frage 12
Frage
This term helps design safeguards to limit the impact of potential events on critical services and infrastructure
Antworten
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Frage 13
Frage
Implement activities to identify the occurrence of a cybersecurity event.
Antworten
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Frage 14
Frage
Take appropriate action after learning of a security event.
Antworten
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Frage 15
Frage
Plan for resilience and the timely repair of compromised capabilities and services.
Antworten
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Frage 16
Frage
___ is the protection of information from unauthorized access or disclosure
Antworten
-
Confidentiality
-
Integrity
-
Availability
Frage 17
Frage
___ is the protection of information from unauthorized modification.
Antworten
-
Confidentiality
-
Integrity
-
Availability
Frage 18
Frage
___ ensures the timely and reliable access to and use of information and systems.
Antworten
-
Confidentiality
-
Integrity
-
Availability
Frage 19
Frage
Personal, financial and medical information require a higher degree of ___ than the minutes of a staff
meeting.
Antworten
-
Confidentiality
-
Integrity
-
Availability
Frage 20
Frage
The ___ of digital information can be maintained using several different means, including access controls, file
permissions and encryption.
Antworten
-
Confidentiality
-
Integrity
-
Availability
Frage 21
Frage
If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:
Antworten
-
Confidentiality
-
Integrity
-
Availability
Frage 22
Frage
The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.
Antworten
-
Confidentiality
-
Integrity
-
Availability
Frage 23
Frage
___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning
Antworten
-
Confidentiality
-
Integrity
-
Availability
Frage 24
Frage
___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.
Frage 25
Frage
The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).
Frage 26
Frage
Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:
Antworten
-
Developing the security strategy
-
Overseeing the security program and initiatives
-
Coordinating with business process owners for ongoing alignment
-
Ensuring that risk and business impact assessments are conducted
-
Implement and manage processes and technical controls
Frage 27
Frage
Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and
network security specialists.
Frage 28
Frage
What is the correct order of Cybersecurity Roles from Top to bottom
Antworten
-
1. Board of Directors
2. Senior Information Security Management
3. Executive Management
4. Cybersecurity Practitioners
-
1. Board of Directors
2. Executive Management
3. Senior Information Security Management
4. Cybersecurity Practitioners