Cyber Security Questions
A________________ is malicious code written to interfere with computer operations and cause damage.
Computer Virus
What historical event resulted in one of the largest known thefts of sensitive data, including social security numbers?
Equifax Breach
Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?
Security and Risk Management
Social engineering is a _______________ that exploits human error to gain private information, access, or valuables.
manipulation technique
Which of the following tasks may be part of the security operations domain ?
1. Conducting Investigations 2.Implementing Preventative Measures 3. Investigating an unknown device that has connected to an internal network
Which of the following tasks may be part of the security architecture and engineering domain?
1. Ensuring that effective systems and processes are in place 2. Configuring a firewall
Which of the following threats are most likely to occur in the event of a phishing attack?
1. malicious software being deployed 2.Employees inadvertently revealing sensitive data 3.
Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?
Identity and Access Management
A security professional is auditing user permissions at their organization in order to ensure employees have the correct access level. Which domain does this scenario describe?
Security Assessment and Testing