Foundations of Cybersecurity Week two quizzes: History of cybersecurity, The 8 CISSP domains
Q4) Social engineering, such as phishing, is a manipulation technique that relies on computer error to gain private information, access, or valuables. True False
False
Q3) What were the key impacts of the Equifax breach? Select two answers. Phishing became illegal due to significant public outcry. Millions of customers' PII were stolen. The significant financial consequences of a breach became more apparent. Developers were able to track illegal copies of software and prevent pirated licenses.
Millions of customers' PII were stolen. The significant financial consequences of a breach became more apparent.
Q8) Why is it useful to understand the eight CISSP security domains? Select two answers. To identify potential career opportunities To develop programming skills To better understand your role within an organization To improve your communication skills
To identify potential career opportunities To better understand your role within an organization
Q2) What is one way that the Morris worm helped shape the security industry? a) It prevented the development of illegal copies of software. b) It made organizations more aware of the significant financial impact of security incidents. c) It inspired threat actors to develop new types of social engineering attacks. d) It led to the development of computer emergency response teams.
d) It led to the development of computer emergency response teams.
Q7) Your supervisor asks you to audit the human resources management system at your organization. The objective of your audit is to ensure the system is granting appropriate access permissions to current human resources administrators. Which security domain is this audit related to? a) Security assessment and testing b) Software development security c) Security operations d) Identity and access management
a) Security assessment and testing
Q5) Fill in the blank: Examples of security _____ include security and risk management and security architecture and engineering. a) networks b) domains c) data d) Assets
b) domains Examples of security domains include security and risk management and security architecture and engineering.
Q6) A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain? a) Security and risk management b) Security architecture and engineering c) Asset security d) Communication and network security
c) Asset security
Q1) Fill in the blank: A computer virus is malicious _____ that interferes with computer operations and causes damage. a) formatting b) sequencing c) code d) hardware
c) code A computer virus is malicious code that interferes with computer operations and causes damage.