M4: Quizzes Flashcards
- All of the following are components of a cybersecurity strategy, EXCEPT:
A. Recover
B. Respond
C. Implementation
D. Identify
C. Implementation
Text, pg 156
Data breaches cost organizations on average __________million dollars.
A. 3.8
B. 5.9
C. 4.7
D. 3.5
B. 5.9
Text pg 118
______ is information that can be used to distinguish or trace an individual’s identity.
A. PHI
B. PIH
C. PII
D. IPI
C. PII
Study guide pg 6, learning outcome 1.3(a); text pg 135-136
Section ________of ERISA generally requires a fiduciary to discharge their duties with respect to a plan solely in the interest of the participants and beneficiaries.
A. 304(a)
B. 404(b)
C. 404(a)
D. 344(a)
C. 404(a)
Study guide pg 7, learning outcome 1.5; text pg 118
______________ is when cybercriminals encrypt and seize an entire hard drive and will only release it for a high ransom.
A. Phishing
B. Ransomware
C. Wire transfer email fraud
D. Malware via external devices
B. Ransomware
Study guide pg 8, learning outcome 2.1; text pg 133
All of the following are data breaches that a government agency identified as having occurred with retirement plans, EXCEPT:
A. Failure to install security system updates
B. An email hoax (phishing attack)
C. Social Security numbers mailed to wrong addresses
D. Using different passwords for multiple clients
D. Using different passwords for multiple clients
Study guide pg 9, learning outcome 2.2; text pg 119
_____specifies rules for business associate agreements that plan sponsors enter with TPAs and other service providers.
A. HIPAA
B. FTC
C. ERISA
D. GMR
A. HIPAA
Study guide pg 11, learning outcome 3.2; text pg 136
Under the terms of the GMR settlement with the FTC, the settlement will remain in force for the next ________ years.
A. Five
B. Ten
C. Twenty
D. Fifteen
C. Twenty
Study guide pg 12, learning outcome 3.5; text pg 122
The DOL issued ________pieces of subregulatory guidance addressing cybersecurity practices.
A. Three
B. Five
C. Two
D. Six
A. Three
Study guide pg 18, learning outcome 5.1; text pg 165
All of the following are examples of data breaches with medical plans, EXCEPT:
A. Encrypted information on laptops
B. Failure to implement physical safeguards at workstations
C. Return of photocopiers without erasing data contained on hard drives
D. Lost documents with PHI
A. Encrypted information on laptops
Study guide pg 9, learning outcome 2.3; text pg 119
Employee benefit plans are susceptible to cyber
attacks, identity theft, and other forms of data
malfeasance due to the lack of personal and
identifiable information.
True or False?
False
PII stands for Personally Identifiable Information.
True or False?
True
Phishing is where fraudulent e-mails are sent with the objective of enticing the user to interact and inadvertently provide an avenue for a cybercriminal to infiltrate a computer network.
True
The Gramm-Leach-Bliley Act controls the ways financial institutions deal with private information of individuals.
True
An example of a non-commercial contracting issue that a service provider contract should address is that a plan service provider’s auditing requirements must be specified.
True