Module 3-01 Challenge Flashcards
What are some of the primary purposes of security frameworks? Select four answers.
- Securing financial information
- Safeguarding specific individuals
- Aligning security with business goals
- Identifying security weaknesses
- Protecting PII data
- Securing financial information
- Aligning security with business goals
- Identifying security weaknesses
- Protecting PII data
Which of the following are core components of security frameworks? Select four answers.
- Implementing security processes
- Establishing regulatory compliance measures
- Monitoring personally identifiable information
- Setting guidelines to achieve security goals
- Monitoring and communicating results
- Identifying and documenting security goals
- Implementing security processes
- Setting guidelines to achieve security goals
- Monitoring and communicating results
- Identifying and documenting security goals
A security professional implements encryption and multi-factor authentication (MFA) to better protect customers’ private data. This is an example of using _____.
- organizational upgrades
- security teams
- networking regulations
- security controls
security controls
You are helping your security team consider risk when setting up a new software system. Using the CIA triad, you focus on confidentiality, integrity, and what else?
- Applications
- Availability
- Accuracy
- Activity
Availability
_____ are items perceived as having value to an organization.
- Lifecycles
- Alerts
- Incidents
- Assets
Assets
Which of the following statements accurately describe the NIST CSF? Select all that apply.
- Security teams use it as a baseline to manage risk.
- It is only effective at managing long-term risk.
- Its purpose is to help manage cybersecurity risk.
- It consists of standards, guidelines, and best practices.
- It is a voluntary framework.
- Security teams use it as a baseline to manage risk.
- Its purpose is to help manage cybersecurity risk.
- It consists of standards, guidelines, and best practices.
- It is a voluntary framework.
Some of the most dangerous threat actors are _____ because they often know where to find sensitive information, can access it, and may have malicious intent.
- dissatisfied customers
- past vendors
- senior partners
- disgruntled employees
disgruntled employees
A security professional is updating software on a coworker’s computer and happens to see a very interesting email about another employee. The security professional chooses to follow company guidelines with regards to privacy protections and does not share the information with coworkers. Which concept does this scenario describe?
- Preserving evidence
- Security ethics
- Security controls
- Business email compromise
Security ethics
Which ethical principle describes safeguarding personal information from unauthorized use?
- Non-bias
- Honesty
- Incident investigation
- Privacy protection
Privacy protection
Which ethical principle describes the rules that are recognized by a community and enforced by a governing entity?
- Laws
- Restrictions
- Guidelines
- Protections
Laws
What are some of the primary purposes of security frameworks? Select three answers.
- Protecting PII data
- Identifying security weaknesses
- Managing organizational risks
- Safeguarding specific individuals
- Protecting PII data
- Identifying security weaknesses
- Managing organizational risks
A security professional has been tasked with implementing strict password policies on workstations to reduce the risk of password theft. This is an example of _____.
- hardware changes
- security teams
- networking regulations
- security controls
security controls
A key aspect of the CIA triad is ensuring that only _____ can access specific assets.
- business competitors
- social media sites
- authorized users
- internet providers
authorized users
A security professional working at a bank is running late for a meeting. They consider saving time by leaving files on their desk that contain client account numbers. However, after thinking about company guidelines with regards to compliance, the security professional takes the time to properly store the files. Which concept does this scenario describe?
- Security ethics
- Preserving evidence
- Security controls
- Public finance
- Security ethics
The ethical principle of _____ involves safeguarding a company database that contains sensitive information about employees.
- unrestricted access
- non-bias
- privacy protection
- honesty
privacy protection