answers
Which security related phrase relates to the integrity of
|\ |\ |\ |\ |\ |\ |\ |\ |\
data? - CORRECT ANSWERS ✔✔Modification
|\ |\ |\ |\
An engineer looks to implement security measures by
|\ |\ |\ |\ |\ |\ |\ |\
following the five functions in the National Institute of
|\ |\ |\ |\ |\ |\ |\ |\ |\
Standards and Technology (NIST) Cybersecurity |\ |\ |\ |\ |\
Framework. When documenting the "detect" function, |\ |\ |\ |\ |\ |\
what does the engineer focus on? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔Ongoing proactive monitoring |\ |\
Any external responsibility for an organization's security
|\ |\ |\ |\ |\ |\ |\
lies mainly with which individuals? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\
✔✔The owner |\
How might the goals of basic network management not
|\ |\ |\ |\ |\ |\ |\ |\ |\
be well-aligned with the goals of security? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Management focuses on availability over |\ |\ |\ |\ |\ |\
confidentiality.
The National Institute of Standards and Technology (NIST)
|\ |\ |\ |\ |\ |\ |\ |\
provides a framework that classifies security-related
|\ |\ |\ |\ |\ |\
,functions. Which description aligns with the "respond" |\ |\ |\ |\ |\ |\ |\
function? - CORRECT ANSWERS ✔✔Identify, analyze, and|\ |\ |\ |\ |\ |\ |\
eradicate threats. |\
A company has an annual contract with an outside firm to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
perform a security audit on their network. The purpose of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
the annual audit is to determine if the company is in
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
compliance with their internal directives and policies for |\ |\ |\ |\ |\ |\ |\ |\
security control. Select the broad class of security control
|\ |\ |\ |\ |\ |\ |\ |\ |\
that accurately demonstrates the purpose of the audit. -
|\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔Managerial |\ |\
The _____ requires federal agencies to develop security
|\ |\ |\ |\ |\ |\ |\ |\
policies for computer systems that process confidential
|\ |\ |\ |\ |\ |\ |\
information. - CORRECT ANSWERS ✔✔Computer Security |\ |\ |\ |\ |\ |\
Act
After a poorly handled security breach, a company
|\ |\ |\ |\ |\ |\ |\ |\
updates its security policy to include an improved
|\ |\ |\ |\ |\ |\ |\ |\
incident response plan. Which of the following security
|\ |\ |\ |\ |\ |\ |\ |\
controls does this update address? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\
✔✔Corrective
The IT department head returns from an industry
|\ |\ |\ |\ |\ |\ |\ |\
conference feeling inspired by a presentation on the topic |\ |\ |\ |\ |\ |\ |\ |\
of cybersecurity frameworks. A meeting is scheduled with
|\ |\ |\ |\ |\ |\ |\ |\
IT staff to brainstorm ideas for deploying security controls
|\ |\ |\ |\ |\ |\ |\ |\ |\
,by category and function throughout the organization.
|\ |\ |\ |\ |\ |\ |\ |\
Which of the following ideas are consistent with industry
|\ |\ |\ |\ |\ |\ |\ |\ |\
definitions? (Select all that apply.) - CORRECT ANSWERS |\ |\ |\ |\ |\ |\ |\ |\
✔✔Deploy a technical control to enforce network access |\ |\ |\ |\ |\ |\ |\ |\
policies.
Schedule quarterly security awareness workshops as a
|\ |\ |\ |\ |\ |\ |\
preventive control to mitigate social engineering attacks. |\ |\ |\ |\ |\ |\
Deploy agents to file servers to perform continuous
|\ |\ |\ |\ |\ |\ |\ |\
backups to cloud storage as a corrective control to
|\ |\ |\ |\ |\ |\ |\ |\ |\
mitigate the impact of malware. |\ |\ |\ |\
Which of the following has a cyber security framework
|\ |\ |\ |\ |\ |\ |\ |\ |\
(CSF) that focuses exclusively on IT security, rather than
|\ |\ |\ |\ |\ |\ |\ |\ |\
IT service provisioning? - CORRECT ANSWERS ✔✔National
|\ |\ |\ |\ |\ |\
Institute of Standards and Technology (NIST)
|\ |\ |\ |\ |\ |\
When exploring the deep web, a user will need which of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
the following to find a specific and hidden dark web site? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔A specific URL
|\ |\ |\ |\ |\
A company technician goes on vacation. While the
|\ |\ |\ |\ |\ |\ |\ |\
technician is away, a critical patch released for Windows
|\ |\ |\ |\ |\ |\ |\ |\ |\
servers is not applied. According to the National Institute
|\ |\ |\ |\ |\ |\ |\ |\ |\
of Standards and Technology (NIST), what does the delay
|\ |\ |\ |\ |\ |\ |\ |\ |\
, in applying the patch create on the server? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Vulnerability |\
Which of the following is mostly considered an insider
|\ |\ |\ |\ |\ |\ |\ |\ |\
threat? (Select all that apply.) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\
✔✔Former employee |\
Contractor
One aspect of threat modeling is to identify potential
|\ |\ |\ |\ |\ |\ |\ |\ |\
threat actors and the risks associated with each one.
|\ |\ |\ |\ |\ |\ |\ |\ |\
When assessing the risk that any one type of threat actor
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
poses to an organization, what are the critical factors to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
profile? (Select all that apply.) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\
✔✔Intent
Motivation
A user with authorized access to systems in a software
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
development firm installs a seemingly harmless, yet |\ |\ |\ |\ |\ |\ |\
unauthorized program on a workstation without the IT |\ |\ |\ |\ |\ |\ |\ |\
department's sanction. Identify the type of threat that is a |\ |\ |\ |\ |\ |\ |\ |\ |\
result of this user's action. - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\
✔✔Unintentional insider threat |\ |\
A contractor has been hired to conduct security
|\ |\ |\ |\ |\ |\ |\ |\
reconnaissance on a company. The contractor browses |\ |\ |\ |\ |\ |\ |\
the company's website to identify employees and then
|\ |\ |\ |\ |\ |\ |\ |\