J Garner
Quiz por , criado more than 1 year ago

1 Security X Quiz sobre Section 1 - Test, criado por J Garner em 04-08-2018.

35
2
0
J Garner
Criado por J Garner quase 6 anos atrás
Fechar

Section 1 - Test

Questão 1 de 28

1

Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?

Selecione uma das seguintes:

  • Board of directors

  • Executive committee

  • Cybersecurity management

  • Cybersecurity practitioners

Explicação

Questão 2 de 28

1

Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?

Selecione uma ou mais das seguintes:

  • Encrypt

  • Protect

  • Investigate

  • Recover

  • Identify

Explicação

Questão 3 de 28

1

Which of the following is the best definition for cybersecurity?

Selecione uma das seguintes:

  • The process by which an organization manages cybersecurity risk to an acceptable level

  • The protection of information from unauthorized access or disclosure

  • The protection of paper documents, digital and intellectual property, and verbal or visual communications

  • Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems

Explicação

Questão 4 de 28

1

Three common controls used to protect the availability of information are:

Selecione uma das seguintes:

  • redundancy, backups and access controls.

  • encryption, file permissions and access controls.

  • access controls, logging and digital signatures.

  • hashes, logging and backups

Explicação

Questão 5 de 28

1

Select all that apply. Governance has several goals, including:

Selecione uma ou mais das seguintes:

  • providing strategic direction.

  • ensuring that objectives are achieved.

  • verifying that organizational resources are being used appropriately.

  • directing and monitoring security activities.

  • ascertaining whether risk is being managed properly

Explicação

Questão 6 de 28

1

The protection of assets from ________ is a primary concern for security in general.

Selecione uma das seguintes:

  • breaches

  • malware

  • threats

  • controls

Explicação

Questão 7 de 28

1

Select all that apply - With respect to technology, many factors can impact security, such as:

Selecione uma ou mais das seguintes:

  • Level of IT complexity

  • Network connectivity (e.g., internal, third-party, public)

  • Specialist industry devices/instrumentation

  • Nature of business

  • Platforms, applications and tools used

  • Industry-specific compliance requirements and regulations

  • Operational support for security

Explicação

Questão 8 de 28

1

Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:

Selecione uma ou mais das seguintes:

  • Nature of business

  • Risk tolerance

  • Risk assessments

  • Operational support for security

  • Security mission, vision and strategy

  • Industry alignment and security trends

Explicação

Questão 9 de 28

1

_______________ deals with information, regardless of its format—it encompasses paper documents, digital
and intellectual property in people’s minds, and verbal or visual communications.

Selecione uma das seguintes:

  • Information security

  • Cybersecurity

Explicação

Questão 10 de 28

1

______________ deals with with protecting digital assets—everything encompassed within network hardware, software
and information that is processed, stored within isolated systems or transported by internetworked information
environments.

Selecione uma das seguintes:

  • Information Security

  • Cybersecurity

Explicação

Questão 11 de 28

1

This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.

Selecione uma das seguintes:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Explicação

Questão 12 de 28

1

This term helps design safeguards to limit the impact of potential events on critical services and infrastructure

Selecione uma das seguintes:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Explicação

Questão 13 de 28

1

Implement activities to identify the occurrence of a cybersecurity event.

Selecione uma das seguintes:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Explicação

Questão 14 de 28

1

Take appropriate action after learning of a security event.

Selecione uma das seguintes:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Explicação

Questão 15 de 28

1

Plan for resilience and the timely repair of compromised capabilities and services.

Selecione uma das seguintes:

  • Identify

  • Protect

  • Detect

  • Respond

  • Recover

Explicação

Questão 16 de 28

1

___ is the protection of information from unauthorized access or disclosure

Selecione uma das seguintes:

  • Confidentiality

  • Integrity

  • Availability

Explicação

Questão 17 de 28

1

___ is the protection of information from unauthorized modification.

Selecione uma das seguintes:

  • Confidentiality

  • Integrity

  • Availability

Explicação

Questão 18 de 28

1

___ ensures the timely and reliable access to and use of information and systems.

Selecione uma das seguintes:

  • Confidentiality

  • Integrity

  • Availability

Explicação

Questão 19 de 28

1

Personal, financial and medical information require a higher degree of ___ than the minutes of a staff
meeting.

Selecione uma das seguintes:

  • Confidentiality

  • Integrity

  • Availability

Explicação

Questão 20 de 28

1

The ___ of digital information can be maintained using several different means, including access controls, file
permissions and encryption.

Selecione uma das seguintes:

  • Confidentiality

  • Integrity

  • Availability

Explicação

Questão 21 de 28

1

If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:

Selecione uma das seguintes:

  • Confidentiality

  • Integrity

  • Availability

Explicação

Questão 22 de 28

1

The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.

Selecione uma das seguintes:

  • Confidentiality

  • Integrity

  • Availability

Explicação

Questão 23 de 28

1

___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning

Selecione uma das seguintes:

  • Confidentiality

  • Integrity

  • Availability

Explicação

Questão 24 de 28

1

___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.

Selecione uma das seguintes:

  • Board of Directors

  • Executive Management

  • Senior Information Security Managment

  • Cybersecurity Practitioners

Explicação

Questão 25 de 28

1

The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).

Selecione uma das seguintes:

  • Board of Directors

  • Executive Management

  • Senior Information Security Management

  • Cybersecurity Practitioners

Explicação

Questão 26 de 28

1

Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:

Selecione uma ou mais das seguintes:

  • Developing the security strategy

  • Overseeing the security program and initiatives

  • Coordinating with business process owners for ongoing alignment

  • Ensuring that risk and business impact assessments are conducted

  • Implement and manage processes and technical controls

Explicação

Questão 27 de 28

1

Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and
network security specialists.

Selecione uma das seguintes:

  • Board of Directors

  • Executive Management

  • Senior Information Security Management

  • Cybersecurity Practitioners

Explicação

Questão 28 de 28

1

What is the correct order of Cybersecurity Roles from Top to bottom

Selecione uma das seguintes:

  • 1. Board of Directors
    2. Senior Information Security Management
    3. Executive Management
    4. Cybersecurity Practitioners

  • 1. Board of Directors
    2. Executive Management
    3. Senior Information Security Management
    4. Cybersecurity Practitioners

Explicação