Course 1 Module 2 Challenge
Security assessment and testing
A security professional is auditing user permissions at their organization in order to ensure employees have the correct access levels. Which domain does this scenario describe?(1)... -Asset security... -Security assessment and testing... -Security and risk management... -Communication and network security
social
Exploiting human error to gain access to private information is an example of _____ engineering (1)... -network... -communication... -digital... -social
LoveLetter attack
What historical event used a malware attachment to steal user information and passwords?(1)... -Morris worm... -Brain virus... -Equifax breach... -LoveLetter attack
Identity and access management
Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?(1)... -Communication and network security... -Identity and access management... -Security and risk management... -Security assessment and testing
Asset security
Which domain involves securing digital and physical assets, as well as managing the storage, maintenance, retention, and destruction of data?(1)... -Security operations... -Security assessment and testing... -Communication and network security... -Asset security
-Business continuity... -Compliance... -Defining security goals and objectives
Which of the following tasks are part of the security and risk management domain?(3)... -Business continuity... -Compliance... -Defining security goals and objectives... -Securing physical assets
-Configuring a firewall... -Ensuring that effective systems and processes are in place
Which of the following tasks may be part of the security architecture and engineering domain?(2)... -Configuring a firewall... -Ensuring that effective systems and processes are in place... -Securing hardware... -Validating the identities of employees
-Conducting investigations... -Implementing preventive measures
Which of the following tasks may be part of the security operations domain?(2)... -Investigating an unknown device that has connected to an internal network... -Using coding practices to create secure applications... -Conducting investigations... -Implementing preventive measures
-Viruses... -Worms
Which of the following threats are examples of malware?(2)... -Bugs... -Error messages... -Viruses... -Worms...
-Employees inadvertently revealing sensitive data... -Malicious software being deployed
Which of the following threats are most likely to occur in the event of a phishing attack?(2)... -Employees inadvertently revealing sensitive data... -Theft of the organization's hardware... -Overtaxing systems with too many internal emails... -Malicious software being deployed