Module 2-01 Challenge Flashcards

1
Q

What is the term for software that is designed to harm devices or networks?

  • Worms
  • Malware
  • Error messages
  • Viruses
  • Bugs
A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What historical event used a malware attachment to steal user information and passwords?

  • Brain virus
  • LoveLetter attack
  • Equifax breach
  • Morris worm
A

LoveLetter Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social engineering is a _____ that exploits human error to gain private information, access, or valuables.

  • manipulation technique
  • business breach
  • replicating virus
  • type of malware
A

manipulation technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security professional conducts internal training to teach their coworkers how to identify a social engineering attack. What types of security issues are they trying to avoid? Select all that apply.

  • Malicious software being deployed
  • Phishing attacks
  • Employees inadvertently revealing sensitive data
  • Overtaxing systems with too many internal emails
A
  • Employees inadvertently revealing sensitive data
  • Malicious software being deployed
  • Phishing attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?

  • Security assessment and testing
  • Security architecture and engineering
  • Security and risk management
  • Identity and access management
A

Security and Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which domain involves optimizing data security by ensuring that effective tools, systems, and processes are in place?

  • Identity and access management
  • Security and risk management
  • Communication and network security
  • Security architecture and engineering
A

Security Architecture and Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which domain involves securing digital and physical assets, as well as managing the storage, maintenance, retention, and destruction of data?

  • Asset security
  • Security operations
  • Security assessment and testing
  • Communication and network security
A

Asset Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security professional is auditing user permissions at their organization to ensure that only the customer service, sales, and marketing teams have access to customer data. Which domain does this scenario describe?

  • Security assessment and testing
  • Security and risk management
  • Asset security
  • Communication and network security
A

Security Assessment and Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security professional must deactivate user accounts when employees leave the company to remove access to sensitive information and resources. Which domain does this scenario describe?

  • Identity and access management
  • Security architecture and engineering
  • Security and risk management
  • Communication and network security
A

Identity and Access Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security professional receives an alert that an unknown device has connected to their organization’s internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?

  • Security operations
  • Asset security
  • Identity and access management
  • Security and risk management
A

Security Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following threats are examples of malware? Select two answers.

  • Worms
  • Viruses
  • Bugs
  • Error messages
A
  • Worms
  • Viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following tasks are part of the security and risk management domain? Select all that apply.

  • Securing physical assets
  • Defining security goals and objectives
  • Business continuity
  • Compliance
A
  • Defining security goals and objectives
  • Business continuity
  • Compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which domain involves conducting, collecting, and analyzing data, as well as conducting security audits to monitor for risks, threats, and vulnerabilities?

  • Security and risk management
  • Communication and network security
  • Security assessment and testing
  • Identity and access management
A

Security assessment and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following tasks may be part of the identity and access management domain? Select three answers.

  • Managing and controlling physical and logical assets
  • Setting up an employee’s access keycard
  • Conducting security control testing
  • Ensuring users follow established policies
A
  • Managing and controlling physical and logical assets
  • Setting up an employee’s access keycard
  • Ensuring users follow established policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____ is malicious code written to interfere with computer operations and cause damage to data.

  • computer virus
  • software breach
  • spyware attack
  • business disruption
A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which security event, related to the successful infiltration of a credit reporting agency, resulted in one of the largest known data breaches of sensitive information, including customers’ social security and credit card numbers?

  • Brain virus
  • Equifax breach
  • Morris worm
  • LoveLetter attack
A

Equifax breach

17
Q

Social engineering is a manipulation technique that exploits _____ error to gain access to private information.

  • coding
  • computer
  • human
  • network
A

human

18
Q

Which of the following threats are most likely to occur in the event of a phishing attack? Select all that apply.

  • Theft of the organization’s hardware
  • Employees inadvertently revealing sensitive data
  • Overtaxing systems with too many internal emails
  • Malicious software being deployed
A
  • Employees inadvertently revealing sensitive data
  • Malicious software being deployed
19
Q

Which of the following tasks are part of the security and risk management domain? Select all that apply.

  • Business continuity
  • Securing physical assets
  • Defining security goals and objectives
  • Compliance
A
  • Business continuity
  • Defining security goals and objectives
  • Compliance
20
Q

The _____ was intended to safeguard medical software from piracy, but instead of tracking illegal copies, it infected computers with a virus that spread to any inserted disks. software.

  • Morris worm
  • Equifax breach
  • Brain virus
  • LoveLetter attack
A

Brain virus

21
Q

Which of the following tasks may be part of the security assessment and testing domain? Select all that apply.

  • Auditing user permissions
  • Conducting security audits
  • Collecting and analyzing data
  • Securing physical networks and wireless communications
A
  • Conducting security audits
  • Collecting and analyzing data
22
Q

A security professional is asked to issue a keycard to a new employee. Which domain does this scenario relate to?

  • Security assessment and testing
  • Identity and access management
  • Security and risk management
  • Communication and network security
A

Identity and access management

23
Q

Which domain involves conducting investigations and implementing preventive measures?

  • Identity and access management
  • Security and risk management
  • Asset security
  • Security operations
A

Security operations