Section 1: Cybersecurity Introduction Flashcards
The following factors can affect information security except:
a. Business plans
b. Server environment
c. Available information technology
d. Security process or system
b. Business environment, not server environment, can affect information security.
The following are drivers when evaluating business plans and general business environment except:
a. Nature of business
b. Risk tolerance
c. Security profile
d. User community and capabilities
d. User community and capabilities is a factor that can impact security. It is not a driver for evaluating business plan and general business environment.
With respect to technology, the following factors can impact security except:
a. Platforms and tools used
b. Network connectivity
c. Level of IT complexity
d. Risk tolerance
e. New or emerging security tools
f. Operational support for security
d. Risk tolerance is not a factor that can impact security with respect to technology. It is a driver for evaluating business plan and general business environment.
There are an estimated 410,000 to 510,000 information security professionals worldwide. By 2018, jobs are expected to increase by how much:
a. 50%
b. 65%
c. 53%
d. 47%
c. 53%
Deals with information, regardless of its format and encompasses paper documents, digital and intellectual property in people’s minds, and verbal and visual communications.
Information Security
Defined as protecting information assets by addressing threats to information processed, stored, and transported by internetworked information systems.
Cybersecurity
The following activities are identified as key functions necessary for the protection of digital assets except:
a. Recover
b. Detect
c. Respond
d. Prevent
e. Identify
d. Prevent
Five functions (in order) are:
- Identify
- Protect
- Detect
- Respond
- Recover
The protection of information from unauthorized access or disclosure.
Confidentiality
Protection from improper disclosure according to its sensitivity and applicable legal requirements.
Integrity
Ensures the timely and reliable access to and use of information and systems.
Availability
Loss of confidentiality can result in the following except:
a. Loss of productive time
b. Disclosure of information protected by privacy laws
c. Loss of public confidence
d. Loss of competitive advantage
a. Loss of productive time is a consequence of loss of availability.
Loss of integrity can result in the following except:
a. Inaccuracy
b. Legal action against the enterprise
c. Erroneous decisions
d. Fraud
b. Legal action against the enterprise is a consequence of loss of confidentiality.
Loss of availability can result in the following except:
a. Loss of functionality and operational effectiveness
b. Loss of productive time
c. Loss of competitive advantage
d. Interference with enterprise’s objectives
c. Loss of competitive advantage is a consequence of loss of confidentiality.
Confidentiality can be preserved using the following methods except:
a. Access controls
b. File permissions
c. Digital signatures
d. Encryption
c. Digital signature is a method used to preserve integrity.
Integrity can be preserved using the following methods except:
a. Access controls
b. File permissions
c. Logging
d. Hashes
b. File permissions is a method used to preserve confidentiality.