Module 1 Quiz Flashcards
Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or unauthorized access.
Criminal Exploitation
What occurs during a security audit?
Review of an organization’s security records, activities, and other related documents
Which of the following entities may be an internal threat to an organization? Select three answers.
Vendors, Trusted Partners and Employees… NOT customers.
Fill in the blank: Identity theft is the act of stealing _____ to commit fraud while impersonating a victim.
Personal Information
Fill in the blank: An organization that is in regulatory compliance is likely to _____ fines.
AVOID
An individual is in their first job as an entry-level security professional. They apply the problem-solving proficiencies that they learned in past roles to their current security career. What does this scenario describe?
Using transferable skills.
Fill in the blank: Security information and event _____ (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.
Management
What do security professionals typically do with SIEM tools?
Identify and analyze security threats, risks, and vulnerabilities
Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)?
- An example of SPII is someone’s financial information.
2.
An example of PII is someone’s date of birth.
3.Both PII and SPII are vulnerable to identity theft. - The theft of SPII is often more damaging than the theft of PII.