Вы находитесь на странице: 1из 14

Question 1

Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

All are benefits of information protection except one.

Select one:
a. upholding the business’ reputation
b. e-mailing the suppliers and partners with updated services
c. preserving the confidence of customers
d. preventing costly security incidents
Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Failure to protect sensitive information can result in __________ issued by regulatory agencies
or lawsuits from other companies or individuals.

Select one:
a. fines
b. notice
c. accusation
d. invitation
Question 3
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

In addition to security, information assurance ensures the identified answers except one.

Select one:
a. usability
b. nonrepudiation
c. data integrity
d. enhanced visuals
Question 4
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

In IA, this automatically happened as well as availability and reliable and timely access to
information.

Select one:
a. meticulousness
b. sincerity
c. confidentiality
d. fabulousness
Question 5
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
No organization can be considered "safe" for any time beyond the last verification of
adherence to its policy.
Select one:
a. integrity
b. availability
c. security
d. confidentiality
Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

This is roughly equivalent to privacy.

Select one:
a. availability
b. confidentiality
c. integrity
d. security
Question 7
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

This assured that the information is authentic and complete.


Select one:
a. availability
b. security
c. integrity
d. confidentiality
Question 8
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

This is an assurance that the systems responsible for delivering, storing, and processing
information are accessible when needed, by those who need them.

Select one:
a. confidentiality
b. availability
c. security
d. integrity
Question 9
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

This is "the environment in which communication over computer networks occurs.“


Select one:
a. Internet
b. cyberspace
c. cyber network
d. World Wide Web
Question 10
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Cyber security, also referred to as____________________, focuses on protecting computers,


networks, programs and data from unintended or unauthorized access, change or
destruction.
Select one:
a. cyber network
b. cyber works
c. information technology security
d. information management
Question 11
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

The state of being protected against the criminal or unauthorized use of electronic data, or
the measures taken to achieve this.
Select one:
a. e-mail verification
b. cyber security
c. password encrypted
d. cyberspace
Question 12
Correct
Mark 1.00 out of 1.00
Flag question

Question text

This refers to the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, damage, or unauthorized access.
Select one:
a. cyber security
b. cyber protection
c. data notification
d. security enhancement
Question 13
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

A significant portion of data can be sensitive information, whether that be __________________,


financial data, personal information, or other types of data for which unauthorized access or
exposure could have negative consequences.

Select one:
a. manuscript
b. blogs
c. edited articles
d. intellectual property
Question 14
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Organizations transmit sensitive data across networks and to other devices in the course of
doing businesses, and this describes the discipline dedicated to protecting that information
and the systems used to process or store it.

Select one:
a. cyber security
b. network assessed
c. cyber fix
d. information assessment
Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text

As the volume and sophistication of cyber attacks grow, companies and organizations need
to take steps to protect their sensitive business and personnel information.
Select one:
True
False
Question 16
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
The organizations and the government have focused most of their cyber security resources
on perimeter security to protect all the encrypted system components.

Select one:
True
False
Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text

This issued guidelines in its risk assessment framework that recommend a shift
toward continuous monitoring and real-time assessment.

Select one:
a. National Institute of Standards and Technology
b. National Cyber Security Alliance
c. Cyber Security Association
d. Cyber Risk Monitoring Group
Question 18
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

This recommends a top-down approach to cyber security in which corporate management


leads the charge in prioritizing cyber security management across all business practices.
Select one:
a. Cyber Risk Monitoring Group
b. National Cyber Crime Fighters
c. National Institute of Standards and Technology
d. National Cyber Security Alliance
Question 19
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

This advises that companies must be prepared to “respond to the inevitable cyber incident,
restore normal operations, and ensure that company assets and the company’s reputation are
protected.”
Select one:
a. CRA
b. CRIM
c. NCSA
d. NIST
Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text

_______________ should also consider any regulations that impact the way the company
collects, stores, and secures data, such as PCI-DSS, HIPAA, SOX, FISMA.

Select one:
a. Cyber Risk Assessment
b. Cyber Space Monitoring
c. Cyber Crime Association
d. Information Assessment
Question 21
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Following a cyber risk assessment, develop and implement a plan to mitigate cyber risk and
protect the “_____________” outlined in the assessment.

Select one:
a. crown jewels
b. suggested
c. password
d. sentence
Question 22
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

Combining sound cyber security measures with an educated and security-minded


employee base provides the best defense against ________________attempting to gain access
to your company’s sensitive data.
Select one:
a. cyber network
b. cloud memory
c. cyber criminals
d. cyber space
Question 23
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

This consists of the cyber-physical systems that modern societies rely on.
Select one:
a. cyber risk assessment
b. security measures
c. cyber security
d. critical infrastructure security
Question 24
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

This is not an example of critical infrastructure.

Select one:
a. shopping centers
b. electricity grid
c. water purification
d. agricultural farm
Question 25
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Negotiations are much more accessible over networks, causing the adoption of security
measures during the development phase to be an imperative phase of the project.
Select one:
True
False
Question 26
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

This is not a type of application security.

Select one:
a. encryption programs
b. firewalls
c. antivirus program
d. photo enhancement
Question 27
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

This ensures that internal networks are secure by protecting the infrastructure and inhibiting
access to it.
Select one:
a. cyber space
b. network regulation
c. network security
d. cyber network
Question 28
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

These are all common examples of network security implementation except one.

Select one:
a. new passwords
b. antivirus program
c. extra logins
d. clean storage feature
Question 29
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text

These are constantly creating and implementing new security tools to help enterprise users
better secure their data.
Select one:
a. vloggers
b. content developer
c. APPS providers
d. cloud providers
Question 30
Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The data is more secure when stored on physical servers and systems the user owned and
controlled.

Select one:
True
False

Вам также может понравиться