Section 1: Cybersecurity Introduction Flashcards

1
Q

The following factors can affect information security except:

a. Business plans
b. Server environment
c. Available information technology
d. Security process or system

A

b. Business environment, not server environment, can affect information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The following are drivers when evaluating business plans and general business environment except:

a. Nature of business
b. Risk tolerance
c. Security profile
d. User community and capabilities

A

d. User community and capabilities is a factor that can impact security. It is not a driver for evaluating business plan and general business environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

With respect to technology, the following factors can impact security except:

a. Platforms and tools used
b. Network connectivity
c. Level of IT complexity
d. Risk tolerance
e. New or emerging security tools
f. Operational support for security

A

d. Risk tolerance is not a factor that can impact security with respect to technology. It is a driver for evaluating business plan and general business environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

There are an estimated 410,000 to 510,000 information security professionals worldwide. By 2018, jobs are expected to increase by how much:

a. 50%
b. 65%
c. 53%
d. 47%

A

c. 53%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Deals with information, regardless of its format and encompasses paper documents, digital and intellectual property in people’s minds, and verbal and visual communications.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Defined as protecting information assets by addressing threats to information processed, stored, and transported by internetworked information systems.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The following activities are identified as key functions necessary for the protection of digital assets except:

a. Recover
b. Detect
c. Respond
d. Prevent
e. Identify

A

d. Prevent

Five functions (in order) are:

  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The protection of information from unauthorized access or disclosure.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protection from improper disclosure according to its sensitivity and applicable legal requirements.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ensures the timely and reliable access to and use of information and systems.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Loss of confidentiality can result in the following except:

a. Loss of productive time
b. Disclosure of information protected by privacy laws
c. Loss of public confidence
d. Loss of competitive advantage

A

a. Loss of productive time is a consequence of loss of availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Loss of integrity can result in the following except:

a. Inaccuracy
b. Legal action against the enterprise
c. Erroneous decisions
d. Fraud

A

b. Legal action against the enterprise is a consequence of loss of confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Loss of availability can result in the following except:

a. Loss of functionality and operational effectiveness
b. Loss of productive time
c. Loss of competitive advantage
d. Interference with enterprise’s objectives

A

c. Loss of competitive advantage is a consequence of loss of confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality can be preserved using the following methods except:

a. Access controls
b. File permissions
c. Digital signatures
d. Encryption

A

c. Digital signature is a method used to preserve integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Integrity can be preserved using the following methods except:

a. Access controls
b. File permissions
c. Logging
d. Hashes

A

b. File permissions is a method used to preserve confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Availability can be preserved using the following methods except:

a. Redundancy
b. Backups
c. Access controls
d. File permissions

A

d. File permissions is a method used to preserve confidentiality.

17
Q

The responsibility of the board of directors and senior management of the organization.

A

Governance

18
Q

The process by which an organization manages risk to acceptable levels.

A

Risk management

19
Q

The act of adhering to, and the ability to demonstrate adherence to, mandated requirements defined by laws and regulations.

A

Compliance

20
Q

Cybersecurity is the responsibility of:

a. senior management
b. IT security manager
c. employees
d. entire organization

A

d. Cybersecurity is the responsibility of the entire organization at every level.

21
Q

The following are the goals of a governance program except:

a. Provide strategic direction
b. Ensure objectives are achieved
c. Ascertain whether the risk is managed appropriately
d. Verify that the IT budget is sufficient

A

d. One of the governance program goals is to verify that the organization’s resources are used responsibly.

22
Q

True or false: A cybersecurity professional may be a practitioner but not part of senior management.

A

False. A cybersecurity professional may be a practitioner or part of senior management.

23
Q

Responsible for ensuring that needed organization functions, resources, and supporting infrastructure are available and properly utilized to fulfill the directives of the board, regulatory compliance, and other demands.

A

Executive management

24
Q

The cybersecurity manager will be responsible for the following except:

a. Developing security strategy
b. Designing and implementing processes and controls
c. Developing risk mitigation strategies
d. Directing and monitoring security activities

A

b. Designing and implementing processes and controls is a function of a cybersecurity practitioner.

25
Q

The cybersecurity manager will be responsible for the following except:

a. Overseeing security program and initiatives
b. Responding to events and incidents
c. Enforcing policy and regulatory compliance
d. Ensuring that risk and BIAs are conducted

A

b. Responding to events and incidents is is a function of a cybersecurity practitioner.

Managing incidents and remediation is a function of the cybersecurity manager.