Foundations of Cybersecurity Week two quizzes: History of cybersecurity, The 8 CISSP domains

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Q4) Social engineering, such as phishing, is a manipulation technique that relies on computer error to gain private information, access, or valuables. True False

False

Q3) What were the key impacts of the Equifax breach? Select two answers. Phishing became illegal due to significant public outcry. Millions of customers' PII were stolen. The significant financial consequences of a breach became more apparent. Developers were able to track illegal copies of software and prevent pirated licenses.

Millions of customers' PII were stolen. The significant financial consequences of a breach became more apparent.

Q8) Why is it useful to understand the eight CISSP security domains? Select two answers. To identify potential career opportunities To develop programming skills To better understand your role within an organization To improve your communication skills

To identify potential career opportunities To better understand your role within an organization

Q2) What is one way that the Morris worm helped shape the security industry? a) It prevented the development of illegal copies of software. b) It made organizations more aware of the significant financial impact of security incidents. c) It inspired threat actors to develop new types of social engineering attacks. d) It led to the development of computer emergency response teams.

d) It led to the development of computer emergency response teams.

Q7) Your supervisor asks you to audit the human resources management system at your organization. The objective of your audit is to ensure the system is granting appropriate access permissions to current human resources administrators. Which security domain is this audit related to? a) Security assessment and testing b) Software development security c) Security operations d) Identity and access management

a) Security assessment and testing

Q5) Fill in the blank: Examples of security _____ include security and risk management and security architecture and engineering. a) networks b) domains c) data d) Assets

b) domains Examples of security domains include security and risk management and security architecture and engineering.

Q6) A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain? a) Security and risk management b) Security architecture and engineering c) Asset security d) Communication and network security

c) Asset security

Q1) Fill in the blank: A computer virus is malicious _____ that interferes with computer operations and causes damage. a) formatting b) sequencing c) code d) hardware

c) code A computer virus is malicious code that interferes with computer operations and causes damage.


Ensembles d'études connexes

AP GOVERNMENT CHAPTER 2 TEST REVIEW

View Set

Principles of Marketing Chapter 3

View Set

EF Inter - U1-9 - grammar revision

View Set

Social Problems: CH10 Health and Medicine

View Set

Depression/Bipolar/Mania/Suicide (Mental Health Test #2)

View Set