Questão 1
Questão
Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?
Questão 2
Questão
Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?
Responda
-
Encrypt
-
Protect
-
Investigate
-
Recover
-
Identify
Questão 3
Questão
Which of the following is the best definition for cybersecurity?
Responda
-
The process by which an organization manages cybersecurity risk to an acceptable level
-
The protection of information from unauthorized access or disclosure
-
The protection of paper documents, digital and intellectual property, and verbal or visual communications
-
Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems
Questão 4
Questão
Three common controls used to protect the availability of information are:
Responda
-
redundancy, backups and access controls.
-
encryption, file permissions and access controls.
-
access controls, logging and digital signatures.
-
hashes, logging and backups
Questão 5
Questão
Select all that apply. Governance has several goals, including:
Responda
-
providing strategic direction.
-
ensuring that objectives are achieved.
-
verifying that organizational resources are being used appropriately.
-
directing and monitoring security activities.
-
ascertaining whether risk is being managed properly
Questão 6
Questão
The protection of assets from ________ is a primary concern for security in general.
Responda
-
breaches
-
malware
-
threats
-
controls
Questão 7
Questão
Select all that apply - With respect to technology, many factors can impact security, such as:
Responda
-
Level of IT complexity
-
Network connectivity (e.g., internal, third-party, public)
-
Specialist industry devices/instrumentation
-
Nature of business
-
Platforms, applications and tools used
-
Industry-specific compliance requirements and regulations
-
Operational support for security
Questão 8
Questão
Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:
Responda
-
Nature of business
-
Risk tolerance
-
Risk assessments
-
Operational support for security
-
Security mission, vision and strategy
-
Industry alignment and security trends
Questão 9
Questão
_______________ deals with information, regardless of its format—it encompasses paper documents, digital
and intellectual property in people’s minds, and verbal or visual communications.
Responda
-
Information security
-
Cybersecurity
Questão 10
Questão
______________ deals with with protecting digital assets—everything encompassed within network hardware, software
and information that is processed, stored within isolated systems or transported by internetworked information
environments.
Responda
-
Information Security
-
Cybersecurity
Questão 11
Questão
This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.
Responda
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Questão 12
Questão
This term helps design safeguards to limit the impact of potential events on critical services and infrastructure
Responda
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Questão 13
Questão
Implement activities to identify the occurrence of a cybersecurity event.
Responda
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Questão 14
Questão
Take appropriate action after learning of a security event.
Responda
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Questão 15
Questão
Plan for resilience and the timely repair of compromised capabilities and services.
Responda
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Questão 16
Questão
___ is the protection of information from unauthorized access or disclosure
Responda
-
Confidentiality
-
Integrity
-
Availability
Questão 17
Questão
___ is the protection of information from unauthorized modification.
Responda
-
Confidentiality
-
Integrity
-
Availability
Questão 18
Questão
___ ensures the timely and reliable access to and use of information and systems.
Responda
-
Confidentiality
-
Integrity
-
Availability
Questão 19
Questão
Personal, financial and medical information require a higher degree of ___ than the minutes of a staff
meeting.
Responda
-
Confidentiality
-
Integrity
-
Availability
Questão 20
Questão
The ___ of digital information can be maintained using several different means, including access controls, file
permissions and encryption.
Responda
-
Confidentiality
-
Integrity
-
Availability
Questão 21
Questão
If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:
Responda
-
Confidentiality
-
Integrity
-
Availability
Questão 22
Questão
The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.
Responda
-
Confidentiality
-
Integrity
-
Availability
Questão 23
Questão
___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning
Responda
-
Confidentiality
-
Integrity
-
Availability
Questão 24
Questão
___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.
Questão 25
Questão
The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).
Questão 26
Questão
Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:
Responda
-
Developing the security strategy
-
Overseeing the security program and initiatives
-
Coordinating with business process owners for ongoing alignment
-
Ensuring that risk and business impact assessments are conducted
-
Implement and manage processes and technical controls
Questão 27
Questão
Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and
network security specialists.
Questão 28
Questão
What is the correct order of Cybersecurity Roles from Top to bottom
Responda
-
1. Board of Directors
2. Senior Information Security Management
3. Executive Management
4. Cybersecurity Practitioners
-
1. Board of Directors
2. Executive Management
3. Senior Information Security Management
4. Cybersecurity Practitioners