Weekly challenge 2
A security professional is ensuring proper storage, maintenance, and retention of their organization's data. Which domain does this scenario describe?
Asset security
Fill in the blank: A ______ is malicious code written to interfere with computer operations and cause damage to data
Computer Virus
Fill in the blank: Social engineering is a manipulation technique that exploits ____ error to gain access to private information.
Human
A security professional is setting up access keycards for new employees. Which domain does this scenario describe?
Identity and access management
Which of the following tasks may be part of the security operations domain?
Implementing preventive measures, Conducting investigations, Investigating an unknown device that has connected to an internal network
What historical event used a malware attachment to steal user information and passwords?
LoveLetter attack
Which of the following tasks are part of the security and risk management domain? Select all that apply.
Business continuity, Defining security goals and objectives, Compliance
A security professional is optimizing data security by ensuring that effective tools, systems, and processes are in place. Which domain this scenario describe?
Security architecture and engineering
A security professional is auditing user permissions at their organization in order to ensure employees have the correct access levels. Which domain does this scenario describe?
Security assessment and testing