Cybersecurity Course 1 M1 Questions
_____ identify, analyze, and preserve criminal evidence within networks, computers, and electronic devices.
Digital forensic investigators
Performing _____ enables security professionals to review an organization's security records, activities, and related documents.
Security Audits
Cybersecurity is the practice of ensuring _____ by protecting networks, devices, people, and data from unauthorized access or criminal exploitation.
confidentiality, integrity, and availability of information
What cybersecurity problems are you solving?
You try to understand threat actors and identify trends that can help with future threats. Also look for vulnerabilities in security to prevent further risks.
In what ways do security teams bring value to an organization?
Achieving regulatory compliance & Protecting against external and internal threats
Which of the following proficiencies are transferable skills, likely to be applicable in almost any field?
Analysis ,Written & Verbal communication, and problem solving
What are examples of sensitive personally identifiable information (SPII) that cybersecurity professionals need to protect? Select two answers.
Medical records and bank account numbers are examples of sensitive personally identifiable information. SPII is a specific type of PII that requires stricter protections because it can be significantly more damaging to individuals if it is stolen.
What are some TECHNICAL skills entry-level security analysts need to develop?
Programming Languages Security info and event management (SIEM) tools Computer forensics
Which of the following proficiencies are technical skills that are needed to become an entry-level security analyst? Select two answers.
Programming and data analysis are technical skills, which are needed to become an entry-level security analyst.
What are the primary responsibilities of an entry-level security analyst? Select three answers.
Protect information, Search for weaknesses and monitor systems
What are some TRANSFERRABLE skills entry-level security analysts need to develop?
Communication collaboration Analysis problem solving