Module 2-01 Challenge Flashcards
What is the term for software that is designed to harm devices or networks?
- Worms
- Malware
- Error messages
- Viruses
- Bugs
Malware
What historical event used a malware attachment to steal user information and passwords?
- Brain virus
- LoveLetter attack
- Equifax breach
- Morris worm
LoveLetter Attack
Social engineering is a _____ that exploits human error to gain private information, access, or valuables.
- manipulation technique
- business breach
- replicating virus
- type of malware
manipulation technique
A security professional conducts internal training to teach their coworkers how to identify a social engineering attack. What types of security issues are they trying to avoid? Select all that apply.
- Malicious software being deployed
- Phishing attacks
- Employees inadvertently revealing sensitive data
- Overtaxing systems with too many internal emails
- Employees inadvertently revealing sensitive data
- Malicious software being deployed
- Phishing attacks
Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?
- Security assessment and testing
- Security architecture and engineering
- Security and risk management
- Identity and access management
Security and Risk Management
Which domain involves optimizing data security by ensuring that effective tools, systems, and processes are in place?
- Identity and access management
- Security and risk management
- Communication and network security
- Security architecture and engineering
Security Architecture and Engineering
Which domain involves securing digital and physical assets, as well as managing the storage, maintenance, retention, and destruction of data?
- Asset security
- Security operations
- Security assessment and testing
- Communication and network security
Asset Security
A security professional is auditing user permissions at their organization to ensure that only the customer service, sales, and marketing teams have access to customer data. Which domain does this scenario describe?
- Security assessment and testing
- Security and risk management
- Asset security
- Communication and network security
Security Assessment and Testing
A security professional must deactivate user accounts when employees leave the company to remove access to sensitive information and resources. Which domain does this scenario describe?
- Identity and access management
- Security architecture and engineering
- Security and risk management
- Communication and network security
Identity and Access Management
A security professional receives an alert that an unknown device has connected to their organization’s internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?
- Security operations
- Asset security
- Identity and access management
- Security and risk management
Security Operations
Which of the following threats are examples of malware? Select two answers.
- Worms
- Viruses
- Bugs
- Error messages
- Worms
- Viruses
Which of the following tasks are part of the security and risk management domain? Select all that apply.
- Securing physical assets
- Defining security goals and objectives
- Business continuity
- Compliance
- Defining security goals and objectives
- Business continuity
- Compliance
Which domain involves conducting, collecting, and analyzing data, as well as conducting security audits to monitor for risks, threats, and vulnerabilities?
- Security and risk management
- Communication and network security
- Security assessment and testing
- Identity and access management
Security assessment and testing
Which of the following tasks may be part of the identity and access management domain? Select three answers.
- Managing and controlling physical and logical assets
- Setting up an employee’s access keycard
- Conducting security control testing
- Ensuring users follow established policies
- Managing and controlling physical and logical assets
- Setting up an employee’s access keycard
- Ensuring users follow established policies
A _____ is malicious code written to interfere with computer operations and cause damage to data.
- computer virus
- software breach
- spyware attack
- business disruption
computer virus
Which security event, related to the successful infiltration of a credit reporting agency, resulted in one of the largest known data breaches of sensitive information, including customers’ social security and credit card numbers?
- Brain virus
- Equifax breach
- Morris worm
- LoveLetter attack
Equifax breach
Social engineering is a manipulation technique that exploits _____ error to gain access to private information.
- coding
- computer
- human
- network
human
Which of the following threats are most likely to occur in the event of a phishing attack? Select all that apply.
- Theft of the organization’s hardware
- Employees inadvertently revealing sensitive data
- Overtaxing systems with too many internal emails
- Malicious software being deployed
- Employees inadvertently revealing sensitive data
- Malicious software being deployed
Which of the following tasks are part of the security and risk management domain? Select all that apply.
- Business continuity
- Securing physical assets
- Defining security goals and objectives
- Compliance
- Business continuity
- Defining security goals and objectives
- Compliance
The _____ was intended to safeguard medical software from piracy, but instead of tracking illegal copies, it infected computers with a virus that spread to any inserted disks. software.
- Morris worm
- Equifax breach
- Brain virus
- LoveLetter attack
Brain virus
Which of the following tasks may be part of the security assessment and testing domain? Select all that apply.
- Auditing user permissions
- Conducting security audits
- Collecting and analyzing data
- Securing physical networks and wireless communications
- Conducting security audits
- Collecting and analyzing data
A security professional is asked to issue a keycard to a new employee. Which domain does this scenario relate to?
- Security assessment and testing
- Identity and access management
- Security and risk management
- Communication and network security
Identity and access management
Which domain involves conducting investigations and implementing preventive measures?
- Identity and access management
- Security and risk management
- Asset security
- Security operations
Security operations