Correct Answers
The process of verifying or proving the user's identification is known as: - CORRECT
ANSWER✔✔Authentication
Which of the following properties is NOT guaranteed by Digital Signatures? - CORRECT
ANSWER✔✔Confidentiality
Which of the following Cybersecurity concepts guarantees that information is accessible only to
those authorized to access it? - CORRECT ANSWER✔✔Confidentiality
Sensitivity is a measure of the ...: - CORRECT ANSWER✔✔... importance assigned to information
by its owner, or the purpose of representing its need for protection.
Which of the following areas is the most distinctive property of PHI? - CORRECT
ANSWER✔✔Confidentiality
Which of the following areas is connected to PII? - CORRECT ANSWER✔✔Confidentiality
An exploitable weakness or flaw in a system or component is a: - CORRECT
ANSWER✔✔Vulnerability
The magnitude of the harm expected as a result of the consequences of an unauthorized
disclosure, modification, destruction, or loss of information, is known as the: - CORRECT
ANSWER✔✔Impact
, Risk Management is: - CORRECT ANSWER✔✔The identification, evaluation and prioritization of
risk
In risk management, the highest priority is given to a risk where: - CORRECT ANSWER✔✔The
frequency of occurrence is low, and the expected impact value is high
An entity that acts to exploit a target organization's system vulnerabilities is a: - CORRECT
ANSWER✔✔Threat Actor
Which of the following is an example of a technical security control? - CORRECT
ANSWER✔✔Access Control Lists
When a company hires an insurance company to mitigate risk, which risk management
technique is being applied? - CORRECT ANSWER✔✔Risk Transfer
Which of the following is NOT an example of a physical security control? - CORRECT
ANSWER✔✔Firewalls
Which of the following is an example of an administrative security control? - CORRECT
ANSWER✔✔Acceptable Use Policies
A Security safeguard is the same as a: - CORRECT ANSWER✔✔Security control
Which of the following are NOT types of security controls? - CORRECT ANSWER✔✔Storage
Controls
A biometric reader that grants access to a computer system in a data center is a: - CORRECT
ANSWER✔✔Technical Control