Академический Документы
Профессиональный Документы
Культура Документы
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. upholding the business’ reputation
b. e-mailing the suppliers and partners with updated services
c. preserving the confidence of customers
d. preventing costly security incidents
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Failure to protect sensitive information can result in __________ issued by regulatory agencies
or lawsuits from other companies or individuals.
Select one:
a. fines
b. notice
c. accusation
d. invitation
Question 3
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
In addition to security, information assurance ensures the identified answers except one.
Select one:
a. usability
b. nonrepudiation
c. data integrity
d. enhanced visuals
Question 4
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
In IA, this automatically happened as well as availability and reliable and timely access to
information.
Select one:
a. meticulousness
b. sincerity
c. confidentiality
d. fabulousness
Question 5
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
No organization can be considered "safe" for any time beyond the last verification of
adherence to its policy.
Select one:
a. integrity
b. availability
c. security
d. confidentiality
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. availability
b. confidentiality
c. integrity
d. security
Question 7
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Flag question
Question text
This is an assurance that the systems responsible for delivering, storing, and processing
information are accessible when needed, by those who need them.
Select one:
a. confidentiality
b. availability
c. security
d. integrity
Question 9
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Question text
Flag question
Question text
The state of being protected against the criminal or unauthorized use of electronic data, or
the measures taken to achieve this.
Select one:
a. e-mail verification
b. cyber security
c. password encrypted
d. cyberspace
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This refers to the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, damage, or unauthorized access.
Select one:
a. cyber security
b. cyber protection
c. data notification
d. security enhancement
Question 13
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. manuscript
b. blogs
c. edited articles
d. intellectual property
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Organizations transmit sensitive data across networks and to other devices in the course of
doing businesses, and this describes the discipline dedicated to protecting that information
and the systems used to process or store it.
Select one:
a. cyber security
b. network assessed
c. cyber fix
d. information assessment
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
As the volume and sophistication of cyber attacks grow, companies and organizations need
to take steps to protect their sensitive business and personnel information.
Select one:
True
False
Question 16
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
The organizations and the government have focused most of their cyber security resources
on perimeter security to protect all the encrypted system components.
Select one:
True
False
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
This issued guidelines in its risk assessment framework that recommend a shift
toward continuous monitoring and real-time assessment.
Select one:
a. National Institute of Standards and Technology
b. National Cyber Security Alliance
c. Cyber Security Association
d. Cyber Risk Monitoring Group
Question 18
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Flag question
Question text
This advises that companies must be prepared to “respond to the inevitable cyber incident,
restore normal operations, and ensure that company assets and the company’s reputation are
protected.”
Select one:
a. CRA
b. CRIM
c. NCSA
d. NIST
Question 20
Correct
Mark 1.00 out of 1.00
Flag question
Question text
_______________ should also consider any regulations that impact the way the company
collects, stores, and secures data, such as PCI-DSS, HIPAA, SOX, FISMA.
Select one:
a. Cyber Risk Assessment
b. Cyber Space Monitoring
c. Cyber Crime Association
d. Information Assessment
Question 21
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Following a cyber risk assessment, develop and implement a plan to mitigate cyber risk and
protect the “_____________” outlined in the assessment.
Select one:
a. crown jewels
b. suggested
c. password
d. sentence
Question 22
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Question text
This consists of the cyber-physical systems that modern societies rely on.
Select one:
a. cyber risk assessment
b. security measures
c. cyber security
d. critical infrastructure security
Question 24
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. shopping centers
b. electricity grid
c. water purification
d. agricultural farm
Question 25
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Negotiations are much more accessible over networks, causing the adoption of security
measures during the development phase to be an imperative phase of the project.
Select one:
True
False
Question 26
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
Select one:
a. encryption programs
b. firewalls
c. antivirus program
d. photo enhancement
Question 27
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
This ensures that internal networks are secure by protecting the infrastructure and inhibiting
access to it.
Select one:
a. cyber space
b. network regulation
c. network security
d. cyber network
Question 28
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
These are all common examples of network security implementation except one.
Select one:
a. new passwords
b. antivirus program
c. extra logins
d. clean storage feature
Question 29
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
These are constantly creating and implementing new security tools to help enterprise users
better secure their data.
Select one:
a. vloggers
b. content developer
c. APPS providers
d. cloud providers
Question 30
Incorrect
Mark 0.00 out of 1.00
Flag question
Question text
The data is more secure when stored on physical servers and systems the user owned and
controlled.
Select one:
True
False