Module 1 challenge
An employee receives an email that they believe to be legitimate. They click on a compromised link within the email. What type of internal threat does this scenario describe?
Accidental
Question 5 What are some key benefits associated with an organization meeting regulatory compliance? Select two answers
Avoiding fines Upholding ethical obligations
An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?
Identity theft
Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or unauthorized access.
criminal exploitation
Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.
An example of PII is someone's email address. SPII is a type of PII that falls under stricter handling guidelines. The theft of SPII is often more damaging than the theft of PII.
A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe?
Computer forensics
An individual is in their first job as an entry-level security professional. They apply the problem-solving proficiencies that they learned in past roles to their current security career. What does this scenario describe?
Using transferable skills
What occurs during a security audit?
Review of an organization's security records, activities, and other related documents
Fill in the blank: Security information and event _____ (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.
management