Course 1 Module 2 Challenge

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Security assessment and testing

A security professional is auditing user permissions at their organization in order to ensure employees have the correct access levels. Which domain does this scenario describe?(1)... -Asset security... -Security assessment and testing... -Security and risk management... -Communication and network security

social

Exploiting human error to gain access to private information is an example of _____ engineering (1)... -network... -communication... -digital... -social

LoveLetter attack

What historical event used a malware attachment to steal user information and passwords?(1)... -Morris worm... -Brain virus... -Equifax breach... -LoveLetter attack

Identity and access management

Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?(1)... -Communication and network security... -Identity and access management... -Security and risk management... -Security assessment and testing

Asset security

Which domain involves securing digital and physical assets, as well as managing the storage, maintenance, retention, and destruction of data?(1)... -Security operations... -Security assessment and testing... -Communication and network security... -Asset security

-Business continuity... -Compliance... -Defining security goals and objectives

Which of the following tasks are part of the security and risk management domain?(3)... -Business continuity... -Compliance... -Defining security goals and objectives... -Securing physical assets

-Configuring a firewall... -Ensuring that effective systems and processes are in place

Which of the following tasks may be part of the security architecture and engineering domain?(2)... -Configuring a firewall... -Ensuring that effective systems and processes are in place... -Securing hardware... -Validating the identities of employees

-Conducting investigations... -Implementing preventive measures

Which of the following tasks may be part of the security operations domain?(2)... -Investigating an unknown device that has connected to an internal network... -Using coding practices to create secure applications... -Conducting investigations... -Implementing preventive measures

-Viruses... -Worms

Which of the following threats are examples of malware?(2)... -Bugs... -Error messages... -Viruses... -Worms...

-Employees inadvertently revealing sensitive data... -Malicious software being deployed

Which of the following threats are most likely to occur in the event of a phishing attack?(2)... -Employees inadvertently revealing sensitive data... -Theft of the organization's hardware... -Overtaxing systems with too many internal emails... -Malicious software being deployed


Ensembles d'études connexes

Cognitive Psychology Chapter 7 Mental Imagery and Cognitive Maps

View Set

Maternal Child Nursing Rasmussen Module 1 NCLEX PREP

View Set

Life and Health Insurance - California Code and Ethics

View Set

F1 Obj. 3.01 Fruits and Vegetables

View Set

Algebra 2: Midterm Exam (study guide)

View Set

Test 2: Scrotum, Prostate, Penis

View Set

AWS All Chapters - All Review Questions

View Set