Question Text: Complete Mark 1.00 Out of 1.00

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 39

Question 

1
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What jobs in information security is this?


Salary: $103,560
Responsibilities: Software developers can be tasked with a wide range of responsibilities
that may include designing parts of computer programs and applications and designing
how those pieces work together.
Software developer
Answer: 

Question 2
Complete
Mark 2.00 out of 2.00

Flag question

Question text

Disruptions in their day-to-day business: Time is money.

Select one:
True
False

Question 3
Complete
Mark 2.00 out of 2.00

Flag question
Question text

First Reason why investing in information security is significant


Rising cost of breaches
Answer: 

Question 4
Complete
Mark 2.00 out of 2.00

Flag question

Question text

Third Reason why investing in information security is significant


Proliferation of IoT devices
Answer: 

Question 5
Complete
Mark 2.00 out of 2.00

Flag question

Question text

Feeling confident about their organization's security level: When information security
community members participated in the Cybersecurity Trends Report, they were asked how
positive they felt about their security stance.

Select one:
True
False

Question 6
Complete
Mark 2.00 out of 2.00
Flag question

Question text

Second Reason why investing in information security is significant


Increasingly sophisticated attacker
Answer: 

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What jobs in information security is this?


Salary: $95,510
Responsibilities: Information security analysts monitor their companies' computer networks
to combat hackers and compile reports of security breaches.
Information Security Analyst
Answer: 

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What jobs in information security is this?


Salary: $104,000
Responsibilities: Create an in-office network for a small business or a cloud infrastructure for
a business with corporate locations in cities on opposite coasts.
Computer Network Architects
Answer: 

Question 9
Complete
Mark 2.00 out of 2.00

Flag question

Question text

Fifth Reason why investing in information security is significant


Regulatory compliances
Answer: 

Question 10
Complete
Mark 2.00 out of 2.00

Flag question

Question text

The need for skilled workers and allocation of funds for security within their budget:
Companies are making the effort to allocate more funds in their budgets for security.

Select one:
True
False

Question 11
Complete
Mark 2.00 out of 2.00
Flag question

Question text

Fourth Reason why investing in information security is significant


Funded hackers and wide availability of hacking tool
Answer: 

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What jobs in information security is this?


Salary: $139,000
Responsibilities: Information systems managers work toward ensuring a company's tech is
capable of meeting their IT goals.
Computer and Information Systems Managers
Answer: 

Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Second Reason why investing in information security is significant


Increasingly sophisticated attacker
Answer: 
Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fourth Reason why investing in information security is significant


Funded hackers and wide availability of hacking tool
Answer: 

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Third Reason why investing in information security is significant


Proliferation of IoT devices
Answer: 

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fifth Reason why investing in information security is significant


Regulatory compliances
Answer: 
Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text

First Reason why investing in information security is significant


Rising cost of breaches
Answer: 

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What jobs in information security is this?


Salary: $104,000
Responsibilities: Create an in-office network for a small business or a cloud infrastructure for
a business with corporate locations in cities on opposite coasts.
Computer Network Architects
Answer: 

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Feeling confident about their organization's security level: When information security
community members participated in the Cybersecurity Trends Report, they were asked how
positive they felt about their security stance.

Select one:
True
False

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Fifth Reason why investing in information security is significant


Regulatory compliances
Answer: 

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What jobs in information security is this?


Salary: $139,000
Responsibilities: Information systems managers work toward ensuring a company's tech is
capable of meeting their IT goals.
Computer and Information Systems Managers
Answer: 

Question 10
Complete
Mark 1.00 out of 1.00
Flag question

Question text

non-substantial
Information is one of the most significantAnswer resources.

-non-substantial

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What jobs in information security is this?


Salary: $103,560
Responsibilities: Software developers can be tasked with a wide range of responsibilities
that may include designing parts of computer programs and applications and designing
how those pieces work together.
Software developer
Answer: 

Question 12
Complete
Mark 5.00 out of 5.00

Flag question

Question text

20 different risk markers grouped under five main categories

Select one:
a. System , Medical, Political, Environmental and Infrastructural Risks
b. Security, Government, Political, Environmental and Infrastructural Risks
c. Security, Medical, Political, Environmental and Infrastructural Risks
d. Security, Medical, Political, Island and Infrastructural Risks

Question 13
Complete
Mark 0.00 out of 1.00

Flag question

Question text

Information Security
Answer was stored in servers in multiple areas, leaving us open to risk.

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text

What jobs in information security is this?


Salary: $95,510
Responsibilities: Information security analysts monitor their companies' computer networks
to combat hackers and compile reports of security breaches.
Information Security Analyst
Answer: 

Question 1
Complete
Mark 1.00 out of 1.00
Flag question

Question text

external systems
The requirements for applications that are connected toAnswer will differ
from those for applications without such interconnection.

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Confidentiality
Answer :controlling who gets to read information.

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text

national defense
For aAnswer , the chief concern may be ensuring the confidentiality of classified
information, whereas a funds transfer system may require strong integrity controls. 

-national defense system

Question 4
Complete
Mark 1.00 out of 1.00
Flag question

Question text

Availability
Answer : assuring that authorized users have continued access to information
and resources.

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Integrity
Answer   :assuring that information and programs are changed only in a
specified and authorized manner.

Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text

The weight given to each of the three major requirements describing needs for information
security—confidentiality, integrity, and availability—depends strongly onAnswer
circumstances
.

Question 2
Complete
Mark 1.00 out of 1.00
Flag question

Question text

Trojan horse
WithAnswer attacks, for example, even legitimate and honest users of an owner
mechanism can be tricked into disclosing secret data. 

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text

system
AAnswer that must be restored within an hour after disruption represents, and
requires, a more demanding set of policies and controls than does a similar system that
need not be restored for two to three days. 

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text

competitive
Early disclosure may jeopardizeAnswer advantage, but disclosure just before
the intended announcement may be insignificant.

Question 5
Complete
Mark 1.00 out of 1.00
Flag question

Question text

Confidentiality
Answer is a requirement whose purpose is to keep sensitive information from
being disclosed to unauthorized recipients. 

Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text

 In any particular circumstance, some threats are more probable than others, and aAnswer
prudent policy setter
must assess the threats, assign a level of concern to each, and state a policy
in terms of which threats are to be resisted.

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Technical meas
Answer may prevent people from doing unauthorized things but cannot prevent
them from doing things that their job functions entitle them to do.

Question 3
Complete
Mark 1.00 out of 1.00
Flag question

Question text

active
Computers areAnswer entities, and programs can be changed in a twinkling, so
that past happiness is no predictor of future bliss. 

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text

As viruses have escalated from a hypothetical to a commonplace threat, it has become


necessary to rethink such policies in regard to methods of distribution and acquisition
software
ofAnswer .

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text

security policy
To be useful, aAnswer must not only state the security need (e.g., for
confidentiality—that data shall be disclosed only to authorized individuals), but also address
the range of circumstances under which that need must be met and the associated
operating standards. 

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text

The framework within which an organization strives to meet its needs for information
security policy
security is codified asAnswer . 

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text

management contr
SomeAnswer are explicitly concerned with protecting information and
information systems, but the concept of management controls includes much more than a
computer's specific role in enforcing security.

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Management controls
Answer are the mechanisms and techniques—administrative, procedural,
and technical—that are instituted to implement a security policy. 

Question 9
Complete
Mark 1.00 out of 1.00
Flag question

Question text

Management controls
Answer are the mechanisms and techniques—administrative, procedural,
and technical—that are instituted to implement a security policy. 

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text

program of mana
An effectiveAnswer controls is needed to cover all aspects of information
security, including physical security, classification of information, the means of recovering
from breaches of security, and above all training to instill awareness and acceptance by
people.

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text

articulation
A major conclusion of this report is that the lack of a clearAnswer of security
policy for general computing is a major impediment to improved security in computer
systems.

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text

One can implement that policy by taking specific actions guided by management control
mechanisms
principles and utilizing specific security standards, procedures, andAnswer .

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text

residual risk
TheAnswer must be managed by auditing, backup, and recovery procedures
supported by general alertness and creative responses. 

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text

organization
AnAnswer must have administrative procedures in place to bring peculiar
actions to the attention of someone who can legitimately inquire into the appropriateness
of such actions, and that person must actually make the inquiry. 

Question 15
Complete
Mark 1.00 out of 1.00
Flag question

Question text

security policy
AAnswer  is a concise statement, by those responsible for a system (e.g.,
senior management), of information values, protection responsibilities, and organizational
commitment.

Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Physical securit

Answer refers to the protection of hardware, software, and data against physical
threats to reduce or prevent disruptions to operations and services and loss of assets.”.

Feedback

The correct answer is: Physical security

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Authentication

 Answer security measures to establish the validity of a transmission, message,


or originator.

Feedback

The correct answer is: Authentication

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Information

 Answer a data endowed with relevance and purpose.

Feedback

The correct answer is: Information

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Non-repudiation

  Answer assurance that the sender is provided with proof of a data delivery and
recipient is provided with proof of the sender’s identity, so that neither can later deny
having processed the data.
Feedback

The correct answer is: Non-repudiation

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Availability

 Answer timely, reliable access to data and information services for authorized
users.

Feedback

The correct answer is: Availability

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Confidentiality

  Answer assurance that information is not disclosed to unauthorized persons.

Feedback
The correct answer is: Confidentiality

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Integrity

  Answer protection against unauthorized modification or destruction of


information.

Feedback

The correct answer is: Integrity

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Personnel secu

 Answer a variety of ongoing measures taken to reduce the likelihood and


severity of accidental and intentional alteration, destruction, misappropriation, misuse,
misconfiguration, unauthorized distribution, and unavailability of an organization’s logical
and physical assets, as the result of action or inaction by insiders and known outsiders, such
as business partners.”.

Feedback
The correct answer is: Personnel security

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Information Assu

Answer is the study of how to protect your information assets from destruction,
degradation, manipulation and exploitation. But also, how to recover should any of those
happen.

Feedback

The correct answer is: Information Assurance

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Debra Herrman

According toAnswer , IA has four major categories: physical security personnel


security IT security operational security.

Feedback

The correct answer is: Debra Herrmann


Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Criminals are constantly surveying the environment for an opportunity to commit crimes.

Select one:
True 
False
Feedback

The correct answer is 'True'.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text

While you are walking, keep your mind on what is going on around you.

Select one:
True 
False
Feedback
The correct answer is 'True'.

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Walk without purpose, scan the area around you and make casual eye contact with others
to display confidence.

Select one:
True
False 
Feedback

Walk with purpose, scan the area around you and make casual eye contact with others to
display confidence.
The correct answer is 'False'.

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Carrying items makes you more vulnerable targets for criminals.

Select one:
True 
False
Feedback

The correct answer is 'True'.

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text

If you have an intuitive feeling something is wrong, trust your instincts.

Select one:
True 
False
Feedback

The correct answer is 'True'.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

If you feel vulnerable do not ask Police or Security to escort you to your car
 
Select one:
True
False 
Feedback

If you feel vulnerable ask Police or Security to escort you to your car
The correct answer is 'False'.

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Always closely guard their personal effects when it comes to identity theft.

Select one:
True 
False
Feedback

The correct answer is 'True'.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Theft of personal items such as pursues can result in more criminal opportunities such as:

Select one:
a. Identity Auto, Stolen Auto, Residential Burglary
b. Identity Auto, Stolen Auto, Residential Auto
c. Illegal Theft, Stolen Auto, Residential Burglary
d. Identity Theft, Stolen Auto, Residential Burglary 
e. Identity Stolen, Stolen Auto, Residential Burglary
Feedback

Your answer is correct.


The correct answer is: Identity Theft, Stolen Auto, Residential Burglary

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Method of reducing criminal opportunity.

Select one:
a. Be alert and aware, Display confidence, Keep your hands free, Trust your instincts, Ask for
help, Don't Closely Guard your personal Effects
b. Be alert and aware, Display confidence, Keep your hands free, Don't Trust your instincts,
Ask for help, Closely Guard your personal Effects
c. Be alert and aware, Display confidence, Keep your hands free, Trust your instincts, Ask for
help, Closely Guard your personal Effects 
d. Not alert and aware, Display confidence, Keep your hands free, Trust your instincts, Ask
for help, Closely Guard your personal Effects
e. Be alert and aware, Display no confidence, Keep your hands free, Trust your instincts, Ask
for help, Closely Guard your personal Effects
Feedback

Your answer is correct.


The correct answer is: Be alert and aware, Display confidence, Keep your hands free, Trust
your instincts, Ask for help, Closely Guard your personal Effects

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Types of private security.

Select one:
a. Technology, Private Alarm Response, Private Guard Patrol Services, Private Security
Guards
b. Technical, Private Alarm Response, Private Patrol Services, Private Security Guards
c. Technology, Private Alarm Response, Private Patrol Services, Private Security Guards 
d. Technology, Private Guard Alarm Response, Private Patrol Services, Private Security
Guards
e. Technology, Private Alarm Response, Private Patrol Services, Private Service Guards
Feedback

Your answer is correct.


The correct answer is: Technology, Private Alarm Response, Private Patrol Services, Private
Security Guards

Question 1
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Operational security

Answer involves the implementation of standard operational security


procedures that define the nature and frequency of the interaction between users, systems,
and system resources, the purpose.

Feedback

The correct answer is: Operational security

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Blyth and Kovacich

According toAnswer , IA can be thought of as protecting information at three


distinct levels.

Feedback

The correct answer is: Blyth and Kovacich

Question 3
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Information and data manipulation abilities in cyberspace.


 

information infrastructure
Answer: 
Feedback

The correct answer is: Information infrastructure

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Knowledge and understanding in human decision space.

perceptual
Answer: 
Feedback

The correct answer is: Perceptual

Question 5
Correct
Mark 1.00 out of 1.00
Flag question

Question text

Data

Answer Raw facts with a known coding system

Feedback

The correct answer is: Data

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Knowledge

Answer Accepted facts, principles, or rules of thumb that are useful for specific
domains.

Feedback

The correct answer is: Knowledge

Question 7
Correct
Mark 1.00 out of 1.00
Flag question

Question text

IT security

Answer the inherent technical features and functions that collectively


contribute to an IT infrastructure achieving and sustaining confidentiality, integrity,
availability, accountability, authenticity, and reliability.”
 

Feedback

The correct answer is: IT security

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Data and data processing activities in physical space.

physical
Answer: 
Feedback

The correct answer is: Physical

Question 9
Correct
Mark 1.00 out of 1.00
Flag question

Question text

vulnerability

Answer is a weakness or fault in a system that exposes information to attack.

Feedback

The correct answer is: Vulnerability

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text

hostile environmen

Answer for assets are one that has known threats.

Feedback

The correct answer is: hostile environment

Question 11
Correct
Mark 1.00 out of 1.00

Flag question
Question text

benign environmen

Answer  is a nonhostile environment that may be protected from external


hostile elements by physical, personnel, and procedural countermeasures.

Feedback

The correct answer is: Benign environment

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Raggad’s

According toAnswer  taxonomy of information security, a computing


environment is made up of five continuously interacting components

Feedback

The correct answer is: Raggad’s

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Noise

Answer Raw facts with an unknown coding system

Feedback

The correct answer is: Noise

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text

enclave

Answer is a collection of computing environments connected by one or more


internal networks under the control of a single authority and security policy, including
personnel and physical security.

Feedback

The correct answer is: Enclave

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text

Information

Answer Processed data


Feedback

The correct answer is: Information

Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Cybersecurity
Answer is all about protecting data that is found in electronic form (such as
computers, servers, networks, mobile devices, etc.) from being compromised or attacked.

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text

Info security is concerned with making sure data in any form is kept secure and is a bit
cybersecurity
broader thanAnswer . 

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information security
Answer is another way of saying “data security.”

Question 4
Complete
Mark 2.00 out of 2.00

Flag question

Question text

IT security tool
The process to protect that data requires more advancedAnswer .

Question 1
Complete
Mark 5.00 out of 5.00

Flag question

Question text

Match the term/details to complete each statement.

 Cybersecurity professionals traditionally understand the


technology, firewalls, and intrusion protection systems Answer 1
needed, but weren’t necessarily brought up in the data evaluation business

___________________.
Over the last decade, we’ve seen a _________________
Answer 2
between cybersecurity and information security, as these fusion
previously siloed positions have come together. 
Both individuals need to know what data is most critical to
the organization so they can focus on placing the right Answer 3
____________________ and monitoring controls on that cyber risk management

data.
In some scenarios, an __________________ would help a
cybersecurity professional prioritize data protection — and Answer 4
then the cybersecurity professional would determine the information security professional

best course of action for the data protection.


If your data is stored physically or digitally, you need to
be sure you have all the right ____________________ in Answer 5
place to prevent unauthorized individuals from gaining physical access controls

access.

You might also like