Question 1
Question
Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?
Question 2
Question
Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?
Answer
-
Encrypt
-
Protect
-
Investigate
-
Recover
-
Identify
Question 3
Question
Which of the following is the best definition for cybersecurity?
Answer
-
The process by which an organization manages cybersecurity risk to an acceptable level
-
The protection of information from unauthorized access or disclosure
-
The protection of paper documents, digital and intellectual property, and verbal or visual communications
-
Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems
Question 4
Question
Three common controls used to protect the availability of information are:
Answer
-
redundancy, backups and access controls.
-
encryption, file permissions and access controls.
-
access controls, logging and digital signatures.
-
hashes, logging and backups
Question 5
Question
Select all that apply. Governance has several goals, including:
Answer
-
providing strategic direction.
-
ensuring that objectives are achieved.
-
verifying that organizational resources are being used appropriately.
-
directing and monitoring security activities.
-
ascertaining whether risk is being managed properly
Question 6
Question
The protection of assets from ________ is a primary concern for security in general.
Answer
-
breaches
-
malware
-
threats
-
controls
Question 7
Question
Select all that apply - With respect to technology, many factors can impact security, such as:
Answer
-
Level of IT complexity
-
Network connectivity (e.g., internal, third-party, public)
-
Specialist industry devices/instrumentation
-
Nature of business
-
Platforms, applications and tools used
-
Industry-specific compliance requirements and regulations
-
Operational support for security
Question 8
Question
Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:
Answer
-
Nature of business
-
Risk tolerance
-
Risk assessments
-
Operational support for security
-
Security mission, vision and strategy
-
Industry alignment and security trends
Question 9
Question
_______________ deals with information, regardless of its format—it encompasses paper documents, digital
and intellectual property in people’s minds, and verbal or visual communications.
Answer
-
Information security
-
Cybersecurity
Question 10
Question
______________ deals with with protecting digital assets—everything encompassed within network hardware, software
and information that is processed, stored within isolated systems or transported by internetworked information
environments.
Answer
-
Information Security
-
Cybersecurity
Question 11
Question
This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.
Answer
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Question 12
Question
This term helps design safeguards to limit the impact of potential events on critical services and infrastructure
Answer
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Question 13
Question
Implement activities to identify the occurrence of a cybersecurity event.
Answer
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Question 14
Question
Take appropriate action after learning of a security event.
Answer
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Question 15
Question
Plan for resilience and the timely repair of compromised capabilities and services.
Answer
-
Identify
-
Protect
-
Detect
-
Respond
-
Recover
Question 16
Question
___ is the protection of information from unauthorized access or disclosure
Answer
-
Confidentiality
-
Integrity
-
Availability
Question 17
Question
___ is the protection of information from unauthorized modification.
Answer
-
Confidentiality
-
Integrity
-
Availability
Question 18
Question
___ ensures the timely and reliable access to and use of information and systems.
Answer
-
Confidentiality
-
Integrity
-
Availability
Question 19
Question
Personal, financial and medical information require a higher degree of ___ than the minutes of a staff
meeting.
Answer
-
Confidentiality
-
Integrity
-
Availability
Question 20
Question
The ___ of digital information can be maintained using several different means, including access controls, file
permissions and encryption.
Answer
-
Confidentiality
-
Integrity
-
Availability
Question 21
Question
If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:
Answer
-
Confidentiality
-
Integrity
-
Availability
Question 22
Question
The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.
Answer
-
Confidentiality
-
Integrity
-
Availability
Question 23
Question
___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning
Answer
-
Confidentiality
-
Integrity
-
Availability
Question 24
Question
___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.
Question 25
Question
The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).
Question 26
Question
Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:
Answer
-
Developing the security strategy
-
Overseeing the security program and initiatives
-
Coordinating with business process owners for ongoing alignment
-
Ensuring that risk and business impact assessments are conducted
-
Implement and manage processes and technical controls
Question 27
Question
Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and
network security specialists.
Question 28
Question
What is the correct order of Cybersecurity Roles from Top to bottom
Answer
-
1. Board of Directors
2. Senior Information Security Management
3. Executive Management
4. Cybersecurity Practitioners
-
1. Board of Directors
2. Executive Management
3. Senior Information Security Management
4. Cybersecurity Practitioners