Section 1 - Test

Description

1 Security X Quiz on Section 1 - Test, created by J Garner on 04/08/2018.
J Garner
Quiz by J Garner, updated more than 1 year ago
J Garner
Created by J Garner almost 6 years ago
35
2

Resource summary

Question 1

Question
Which of the following cybersecurity roles is charged with the duty of managing incidents and remediation?
Answer
  • Board of directors
  • Executive committee
  • Cybersecurity management
  • Cybersecurity practitioners

Question 2

Question
Choose three. According to the NIST cybersecurity framework, which of the following are considered key functions necessary for the protection of digital assets?
Answer
  • Encrypt
  • Protect
  • Investigate
  • Recover
  • Identify

Question 3

Question
Which of the following is the best definition for cybersecurity?
Answer
  • The process by which an organization manages cybersecurity risk to an acceptable level
  • The protection of information from unauthorized access or disclosure
  • The protection of paper documents, digital and intellectual property, and verbal or visual communications
  • Protecting information assets by addressing threats to information that is processed, stored or transported by internetworked information systems

Question 4

Question
Three common controls used to protect the availability of information are:
Answer
  • redundancy, backups and access controls.
  • encryption, file permissions and access controls.
  • access controls, logging and digital signatures.
  • hashes, logging and backups

Question 5

Question
Select all that apply. Governance has several goals, including:
Answer
  • providing strategic direction.
  • ensuring that objectives are achieved.
  • verifying that organizational resources are being used appropriately.
  • directing and monitoring security activities.
  • ascertaining whether risk is being managed properly

Question 6

Question
The protection of assets from ________ is a primary concern for security in general.
Answer
  • breaches
  • malware
  • threats
  • controls

Question 7

Question
Select all that apply - With respect to technology, many factors can impact security, such as:
Answer
  • Level of IT complexity
  • Network connectivity (e.g., internal, third-party, public)
  • Specialist industry devices/instrumentation
  • Nature of business
  • Platforms, applications and tools used
  • Industry-specific compliance requirements and regulations
  • Operational support for security

Question 8

Question
Select All that apply - When evaluating business plans and the general business environment, consider drivers, such as:
Answer
  • Nature of business
  • Risk tolerance
  • Risk assessments
  • Operational support for security
  • Security mission, vision and strategy
  • Industry alignment and security trends

Question 9

Question
_______________ deals with information, regardless of its format—it encompasses paper documents, digital and intellectual property in people’s minds, and verbal or visual communications.
Answer
  • Information security
  • Cybersecurity

Question 10

Question
______________ deals with with protecting digital assets—everything encompassed within network hardware, software and information that is processed, stored within isolated systems or transported by internetworked information environments.
Answer
  • Information Security
  • Cybersecurity

Question 11

Question
This term uses organizational understanding to minimize risk to systems, assets, data and capabilities.
Answer
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Question 12

Question
This term helps design safeguards to limit the impact of potential events on critical services and infrastructure
Answer
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Question 13

Question
Implement activities to identify the occurrence of a cybersecurity event.
Answer
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Question 14

Question
Take appropriate action after learning of a security event.
Answer
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Question 15

Question
Plan for resilience and the timely repair of compromised capabilities and services.
Answer
  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

Question 16

Question
___ is the protection of information from unauthorized access or disclosure
Answer
  • Confidentiality
  • Integrity
  • Availability

Question 17

Question
___ is the protection of information from unauthorized modification.
Answer
  • Confidentiality
  • Integrity
  • Availability

Question 18

Question
___ ensures the timely and reliable access to and use of information and systems.
Answer
  • Confidentiality
  • Integrity
  • Availability

Question 19

Question
Personal, financial and medical information require a higher degree of ___ than the minutes of a staff meeting.
Answer
  • Confidentiality
  • Integrity
  • Availability

Question 20

Question
The ___ of digital information can be maintained using several different means, including access controls, file permissions and encryption.
Answer
  • Confidentiality
  • Integrity
  • Availability

Question 21

Question
If a bank transfers $10,000 to another financial institution, it is important that the amount does not change to $100,000 during the exchange. This is an example of:
Answer
  • Confidentiality
  • Integrity
  • Availability

Question 22

Question
The ___ of digital assets can be controlled and verified by logging, digital signatures, hashes, encryption and access controls.
Answer
  • Confidentiality
  • Integrity
  • Availability

Question 23

Question
___ can be protected by the use of redundancy, backups and implementation of business continuity management and planning
Answer
  • Confidentiality
  • Integrity
  • Availability

Question 24

Question
___ looks to the chief information security officer (CISO) or other senior cybersecurity manager to define the information security program and its subsequent management.
Answer
  • Board of Directors
  • Executive Management
  • Senior Information Security Managment
  • Cybersecurity Practitioners

Question 25

Question
The individual who oversees information security and cybersecurity (CISO, CSO, or Cybersecurity Manager).
Answer
  • Board of Directors
  • Executive Management
  • Senior Information Security Management
  • Cybersecurity Practitioners

Question 26

Question
Check all that apply - Generally, the cybersecurity manager (Senior Information Security Management) will be responsible for:
Answer
  • Developing the security strategy
  • Overseeing the security program and initiatives
  • Coordinating with business process owners for ongoing alignment
  • Ensuring that risk and business impact assessments are conducted
  • Implement and manage processes and technical controls

Question 27

Question
Security architects, administrators, digital forensics, incident handlers, vulnerability researchers, and network security specialists.
Answer
  • Board of Directors
  • Executive Management
  • Senior Information Security Management
  • Cybersecurity Practitioners

Question 28

Question
What is the correct order of Cybersecurity Roles from Top to bottom
Answer
  • 1. Board of Directors 2. Senior Information Security Management 3. Executive Management 4. Cybersecurity Practitioners
  • 1. Board of Directors 2. Executive Management 3. Senior Information Security Management 4. Cybersecurity Practitioners
Show full summary Hide full summary

Similar

GCSE AQA Chemistry - Unit 1
James Jolliffe
Topic 1 Quiz - Elements & The Periodic Table
Musicdudejoe
Tourism 1
Scott Church
AQA Business Unit 1
lauren_binney
Chapter 3
Ryan Tram
Chapter 2
Ryan Tram
Coastlines 2
Scott Church
Chapter 4
Ryan Tram
Chapter 8
Ryan Tram
Chapter 6
Ryan Tram
Chapter 5
Ryan Tram