Section 1 - Test

Descripción

1 Security X Test sobre Section 1 - Test, creado por J Garner el 04/08/2018.
J Garner
Test por J Garner, actualizado hace más de 1 año
J Garner
Creado por J Garner hace casi 6 años
35
2

Resumen del Recurso

Pregunta 1

Pregunta
Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?
Respuesta
  • Board of directors
  • Executive committee
  • Cybersecurity management
  • Cybersecurity practitioners

Pregunta 2

Pregunta
Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?
Respuesta
  • Encrypt
  • Protect
  • Investigate
  • Recover
  • Identify

Pregunta 3

Pregunta
Which of the following is the best definition for cybersecurity?
Respuesta
  • The process by which an organization manages cybersecurity risk to an acceptable level
  • The protection of information from unauthorized access or disclosure
  • The protection of paper documents, digital and intellectual property, and verbal or visual communications
  • Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems

Pregunta 4

Pregunta
Three common controls used to protect the availability of information are:
Respuesta
  • redundancy, backups and access controls.
  • encryption, file permissions and access controls.
  • access controls, logging and digital signatures.
  • hashes, logging and backups

Pregunta 5

Pregunta
Select all that apply. Governance has several goals, including:
Respuesta
  • providing strategic direction.
  • ensuring that objectives are achieved.
  • verifying that organizational resources are being used appropriately.
  • directing and monitoring security activities.
  • ascertaining whether risk is being managed properly

Pregunta 6

Pregunta
The protection of assets from ________ is a primary concern for security in general.
Respuesta
  • breaches
  • malware
  • threats
  • controls

Pregunta 7

Pregunta
Select all that apply - With respect to technology, many factors can impact security, such as:
Respuesta
  • Level of IT complexity
  • Network connectivity (e.g., internal, third-party, public)
  • Specialist industry devices/instrumentation
  • Nature of business
  • Platforms, applications and tools used
  • Industry-specific compliance requirements and regulations
  • Operational support for security

Pregunta 8

Pregunta
Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:
Respuesta
  • Nature of business
  • Risk tolerance
  • Risk assessments
  • Operational support for security
  • Security mission, vision and strategy
  • Industry alignment and security trends

Pregunta 9

Pregunta
_______________ deals with information, regardless of its format—it encompasses paper documents, digital and intellectual property in people’s minds, and verbal or visual communications.
Respuesta
  • Information security
  • Cybersecurity

Pregunta 10

Pregunta
______________ deals with with protecting digital assets—everything encompassed within network hardware, software and information that is processed, stored within isolated systems or transported by internetworked information environments.
Respuesta
  • Information Security
  • Cybersecurity

Pregunta 11

Pregunta
This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.
Respuesta
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Pregunta 12

Pregunta
This term helps design safeguards to limit the impact of potential events on critical services and infrastructure
Respuesta
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Pregunta 13

Pregunta
Implement activities to identify the occurrence of a cybersecurity event.
Respuesta
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Pregunta 14

Pregunta
Take appropriate action after learning of a security event.
Respuesta
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Pregunta 15

Pregunta
Plan for resilience and the timely repair of compromised capabilities and services.
Respuesta
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Pregunta 16

Pregunta
___ is the protection of information from unauthorized access or disclosure
Respuesta
  • Confidentiality
  • Integrity
  • Availability

Pregunta 17

Pregunta
___ is the protection of information from unauthorized modification.
Respuesta
  • Confidentiality
  • Integrity
  • Availability

Pregunta 18

Pregunta
___ ensures the timely and reliable access to and use of information and systems.
Respuesta
  • Confidentiality
  • Integrity
  • Availability

Pregunta 19

Pregunta
Personal, financial and medical information require a higher degree of ___ than the minutes of a staff meeting.
Respuesta
  • Confidentiality
  • Integrity
  • Availability

Pregunta 20

Pregunta
The ___ of digital information can be maintained using several different means, including access controls, file permissions and encryption.
Respuesta
  • Confidentiality
  • Integrity
  • Availability

Pregunta 21

Pregunta
If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:
Respuesta
  • Confidentiality
  • Integrity
  • Availability

Pregunta 22

Pregunta
The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.
Respuesta
  • Confidentiality
  • Integrity
  • Availability

Pregunta 23

Pregunta
___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning
Respuesta
  • Confidentiality
  • Integrity
  • Availability

Pregunta 24

Pregunta
___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.
Respuesta
  • Board of Directors
  • Executive Management
  • Senior Information Security Managment
  • Cybersecurity Practitioners

Pregunta 25

Pregunta
The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).
Respuesta
  • Board of Directors
  • Executive Management
  • Senior Information Security Management
  • Cybersecurity Practitioners

Pregunta 26

Pregunta
Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:
Respuesta
  • Developing the security strategy
  • Overseeing the security program and initiatives
  • Coordinating with business process owners for ongoing alignment
  • Ensuring that risk and business impact assessments are conducted
  • Implement and manage processes and technical controls

Pregunta 27

Pregunta
Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and network security specialists.
Respuesta
  • Board of Directors
  • Executive Management
  • Senior Information Security Management
  • Cybersecurity Practitioners

Pregunta 28

Pregunta
What is the correct order of Cybersecurity Roles from Top to bottom
Respuesta
  • 1. Board of Directors 2. Senior Information Security Management 3. Executive Management 4. Cybersecurity Practitioners
  • 1. Board of Directors 2. Executive Management 3. Senior Information Security Management 4. Cybersecurity Practitioners
Mostrar resumen completo Ocultar resumen completo

Similar

GCSE AQA Chemistry - Unit 1
James Jolliffe
Topic 1 Quiz - Elements & The Periodic Table
Musicdudejoe
Tourism 1
Scott Church
AQA Business Unit 1
lauren_binney
Chapter 3
Ryan Tram
Chapter 2
Ryan Tram
Coastlines 2
Scott Church
Chapter 4
Ryan Tram
Chapter 8
Ryan Tram
Chapter 6
Ryan Tram
Chapter 5
Ryan Tram