Module 2-01 Challenge Flashcards
What is the term for software that is designed to harm devices or networks?
- Worms
- Malware
- Error messages
- Viruses
- Bugs
Malware
What historical event used a malware attachment to steal user information and passwords?
- Brain virus
- LoveLetter attack
- Equifax breach
- Morris worm
LoveLetter Attack
Social engineering is a _____ that exploits human error to gain private information, access, or valuables.
- manipulation technique
- business breach
- replicating virus
- type of malware
manipulation technique
A security professional conducts internal training to teach their coworkers how to identify a social engineering attack. What types of security issues are they trying to avoid? Select all that apply.
- Malicious software being deployed
- Phishing attacks
- Employees inadvertently revealing sensitive data
- Overtaxing systems with too many internal emails
- Employees inadvertently revealing sensitive data
- Malicious software being deployed
- Phishing attacks
Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?
- Security assessment and testing
- Security architecture and engineering
- Security and risk management
- Identity and access management
Security and Risk Management
Which domain involves optimizing data security by ensuring that effective tools, systems, and processes are in place?
- Identity and access management
- Security and risk management
- Communication and network security
- Security architecture and engineering
Security Architecture and Engineering
Which domain involves securing digital and physical assets, as well as managing the storage, maintenance, retention, and destruction of data?
- Asset security
- Security operations
- Security assessment and testing
- Communication and network security
Asset Security
A security professional is auditing user permissions at their organization to ensure that only the customer service, sales, and marketing teams have access to customer data. Which domain does this scenario describe?
- Security assessment and testing
- Security and risk management
- Asset security
- Communication and network security
Security Assessment and Testing
A security professional must deactivate user accounts when employees leave the company to remove access to sensitive information and resources. Which domain does this scenario describe?
- Identity and access management
- Security architecture and engineering
- Security and risk management
- Communication and network security
Identity and Access Management
A security professional receives an alert that an unknown device has connected to their organization’s internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?
- Security operations
- Asset security
- Identity and access management
- Security and risk management
Security Operations
Which of the following threats are examples of malware? Select two answers.
- Worms
- Viruses
- Bugs
- Error messages
- Worms
- Viruses
Which of the following tasks are part of the security and risk management domain? Select all that apply.
- Securing physical assets
- Defining security goals and objectives
- Business continuity
- Compliance
- Defining security goals and objectives
- Business continuity
- Compliance
Which domain involves conducting, collecting, and analyzing data, as well as conducting security audits to monitor for risks, threats, and vulnerabilities?
- Security and risk management
- Communication and network security
- Security assessment and testing
- Identity and access management
Security assessment and testing
Which of the following tasks may be part of the identity and access management domain? Select three answers.
- Managing and controlling physical and logical assets
- Setting up an employee’s access keycard
- Conducting security control testing
- Ensuring users follow established policies
- Managing and controlling physical and logical assets
- Setting up an employee’s access keycard
- Ensuring users follow established policies
A _____ is malicious code written to interfere with computer operations and cause damage to data.
- computer virus
- software breach
- spyware attack
- business disruption
computer virus