Pregunta 1
Pregunta
Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?
Pregunta 2
Pregunta
Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?
Respuesta
-
Encrypt
-
Protect
-
Investigate
-
Recover
-
Identify
Pregunta 3
Pregunta
Which of the following is the best definition for cybersecurity?
Respuesta
-
The process by which an organization manages cybersecurity risk to an acceptable level
-
The protection of information from unauthorized access or disclosure
-
The protection of paper documents, digital and intellectual property, and verbal or visual communications
-
Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems
Pregunta 4
Pregunta
Three common controls used to protect the availability of information are:
Respuesta
-
redundancy, backups and access controls.
-
encryption, file permissions and access controls.
-
access controls, logging and digital signatures.
-
hashes, logging and backups
Pregunta 5
Pregunta
Select all that apply. Governance has several goals, including:
Respuesta
-
providing strategic direction.
-
ensuring that objectives are achieved.
-
verifying that organizational resources are being used appropriately.
-
directing and monitoring security activities.
-
ascertaining whether risk is being managed properly
Pregunta 6
Pregunta
The protection of assets from ________ is a primary concern for security in general.
Respuesta
-
breaches
-
malware
-
threats
-
controls
Pregunta 7
Pregunta
Select all that apply - With respect to technology, many factors can impact security, such as:
Respuesta
-
Level of IT complexity
-
Network connectivity (e.g., internal, third-party, public)
-
Specialist industry devices/instrumentation
-
Nature of business
-
Platforms, applications and tools used
-
Industry-specific compliance requirements and regulations
-
Operational support for security
Pregunta 8
Pregunta
Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:
Respuesta
-
Nature of business
-
Risk tolerance
-
Risk assessments
-
Operational support for security
-
Security mission, vision and strategy
-
Industry alignment and security trends
Pregunta 9
Pregunta
_______________ deals with information, regardless of its format—it encompasses paper documents, digital
and intellectual property in people’s minds, and verbal or visual communications.
Respuesta
-
Information security
-
Cybersecurity
Pregunta 10
Pregunta
______________ deals with with protecting digital assets—everything encompassed within network hardware, software
and information that is processed, stored within isolated systems or transported by internetworked information
environments.
Respuesta
-
Information Security
-
Cybersecurity
Pregunta 11
Pregunta
This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.
Respuesta
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Pregunta 12
Pregunta
This term helps design safeguards to limit the impact of potential events on critical services and infrastructure
Respuesta
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Pregunta 13
Pregunta
Implement activities to identify the occurrence of a cybersecurity event.
Respuesta
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Pregunta 14
Pregunta
Take appropriate action after learning of a security event.
Respuesta
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Pregunta 15
Pregunta
Plan for resilience and the timely repair of compromised capabilities and services.
Respuesta
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Pregunta 16
Pregunta
___ is the protection of information from unauthorized access or disclosure
Respuesta
-
Confidentiality
-
Integrity
-
Availability
Pregunta 17
Pregunta
___ is the protection of information from unauthorized modification.
Respuesta
-
Confidentiality
-
Integrity
-
Availability
Pregunta 18
Pregunta
___ ensures the timely and reliable access to and use of information and systems.
Respuesta
-
Confidentiality
-
Integrity
-
Availability
Pregunta 19
Pregunta
Personal, financial and medical information require a higher degree of ___ than the minutes of a staff
meeting.
Respuesta
-
Confidentiality
-
Integrity
-
Availability
Pregunta 20
Pregunta
The ___ of digital information can be maintained using several different means, including access controls, file
permissions and encryption.
Respuesta
-
Confidentiality
-
Integrity
-
Availability
Pregunta 21
Pregunta
If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:
Respuesta
-
Confidentiality
-
Integrity
-
Availability
Pregunta 22
Pregunta
The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.
Respuesta
-
Confidentiality
-
Integrity
-
Availability
Pregunta 23
Pregunta
___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning
Respuesta
-
Confidentiality
-
Integrity
-
Availability
Pregunta 24
Pregunta
___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.
Pregunta 25
Pregunta
The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).
Pregunta 26
Pregunta
Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:
Respuesta
-
Developing the security strategy
-
Overseeing the security program and initiatives
-
Coordinating with business process owners for ongoing alignment
-
Ensuring that risk and business impact assessments are conducted
-
Implement and manage processes and technical controls
Pregunta 27
Pregunta
Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and
network security specialists.
Pregunta 28
Pregunta
What is the correct order of Cybersecurity Roles from Top to bottom
Respuesta
-
1. Board of Directors
2. Senior Information Security Management
3. Executive Management
4. Cybersecurity Practitioners
-
1. Board of Directors
2. Executive Management
3. Senior Information Security Management
4. Cybersecurity Practitioners