Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cyber Security Fundamentals exam 2 UPDATED Study Guide QUESTIONS AND CORRECT ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
11
Cijfer
A+
Geüpload op
23-11-2025
Geschreven in
2025/2026

Cyber Security Fundamentals exam 2 UPDATED Study Guide QUESTIONS AND CORRECT ANSWERS Some policies may need a(n) ____________________ indicating their expiration date. - CORRECT ANSWERS sunset clause In recent years, NIST has shifted its approach from implementing security controls using a certification and accreditation (C&A) model to one more aligned with industry practices, titled the Risk Management Framework. _________________________ - CORRECT ANSWERS True

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Cyber Security Fundamentals exam 2
UPDATED Study Guide QUESTIONS
AND CORRECT ANSWERS
Some policies may need a(n) ____________________ indicating their
expiration date. - CORRECT ANSWERS sunset clause


In recent years, NIST has shifted its approach from implementing security
controls using a certification and accreditation (C&A) model to one more
aligned with industry practices, titled the Risk Management Framework.
_________________________ - CORRECT ANSWERS True


A(n) sequential roster is activated as the first person calls a few people on the
roster, who in turn call a few other people. _________________________ -
CORRECT ANSWERS False (Hierarchical)


A(n) ____________________ is a scripted description of an incident, usually
just enough information so that each individual knows what portion of the IRP
to implement, and not enough to slow down the notification process. -
CORRECT ANSWERS alert message


Each policy should contain procedures and a timetable for periodic review. -
CORRECT ANSWERS True


The ________is based on and directly supports the mission, vision, and
direction of the organization and sets the strategic direction, scope, and tone for
all security efforts. - CORRECT ANSWERS EISP


A(n) ____________________ site is a fully configured computer facility, with
all services, communications links, and physical plant operations including
heating and air conditioning. - CORRECT ANSWERS hot

, A(n) ____________________ is a plan or course of action that conveys
instructions from an organization's senior management to those who make
decisions, take actions, and perform other duties. - CORRECT ANSWERS
Policy


____________________ controls are information security safeguards that focus
on the application of modern technologies, systems, and processes to protect
information assets.. - CORRECT ANSWERS technical


The transfer of large batches of data to an off-site facility, usually through
leased lines or services, is called ____. - CORRECT ANSWERS
electronic vaulting


__________ is a strategy for the protection of information assets that uses
multiple layers and different types of controls (managerial, operational, and
technical) to provide optimal protection. - CORRECT ANSWERS
Defense in depth


Incident _________ is the rapid determination of the scope of the breach of the
confidentiality, integrity, and availability of information and information assets
during or just following an incident. - CORRECT ANSWERS damage
assessment


ACLs are more specific to the operation of a system than rule-based policies
and they may or may not deal with users directly. - CORRECT ANSWERS
False (Rule based policy are more specific)


An attack, breach of policy, or other incident always constitutes a violation of
law, requiring notification of law enforcement. - CORRECT ANSWERS
False

Geschreven voor

Vak

Documentinformatie

Geüpload op
23 november 2025
Aantal pagina's
11
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
nzomokelvin15

Maak kennis met de verkoper

Seller avatar
nzomokelvin15 Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
8 maanden
Aantal volgers
0
Documenten
1511
Laatst verkocht
6 dagen geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen