module 1 challenge

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

2. Question 2 Which of the following tasks are typically responsibilities of entry-level security analysts? Select all that apply. a. Protecting computer and network systems b. Creating organizational policies c. Installing prevention software d. Examining in-house security issues

a. Protecting computer and network systems c. Installing prevention software d. Examining in-house security issues

3. Question 3 Which of the following entities may be an internal threat to an organization? Select three answers. a. Trusted partners b. Vendors c. Employees d. Customers

a. Trusted partners b. Vendors c. Employees

Question 5 Fill in the blank: An organization that is in regulatory compliance is likely to _____ fines. a. encounter b. incur c. avoid d. rectify

c. avoid

9. Question 9 Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply. a. PII is any information used to infer an individual's identity. b. An example of SPII is someone's biometric data. c. An example of PII is someone's phone number. d. Only SPII is vulnerable to identity theft.

a. PII is any information used to infer an individual's identity. b. An example of SPII is someone's biometric data. c. An example of PII is someone's phone number.

Question 8 A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe? a. Computer forensics b. Programming with code c. Software upgrades d. Resolving error messages

a. computer forensics

4. Question 4 An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe? a. Identity theft b. Data breach c. Secured customer data d. Network infiltration

a. identity theft

7. Question 7 Fill in the blank: Security information and _____ management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities. a. enterprise b. event c. emergency d. employer

b. event

1. Question 1 Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or criminal exploitation. a. changing business priorities b. unauthorized access c. market shifts d. poor financial management

b. unauthorized access

6. Question 6 An individual is in their first job as an entry-level security professional. They apply the problem-solving proficiencies that they learned in past roles to their current security career. What does this scenario describe? a. Taking on-the-job training b. Understanding business standards c. Using transferable skills d. Having expertise with a specific procedure

c. using transferable skills


Ensembles d'études connexes

give me liberty chapter 20 reading

View Set

INEQUALITY THEOREM IN ONE TRIANGLE PART 2

View Set

Chapter 10: Fitness Goal Setting and Leadership

View Set

LWTech Psychology 100 Test 3 Review

View Set

Latina Poetry as an Expression of Cultural Heritage

View Set

Ch. 17 Quality of Life for Children Living with Chronic or Complex Diseases

View Set