Module 2 challenge
Fill in the blank: The _____ spread globally within a couple of months due to users inserting a disk into their computers that was meant to track illegal copies of medical software.
Brain virus
Which of the following tasks may be part of the security architecture and engineering domain? Select all that apply.
Configuring a firewall Ensuring that effective systems and processes are in place
Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?
Identity and access management
Which of the following tasks may be part of the asset security domain? Select all that apply.
Proper disposal of digital assets Securing digital and physical assets Data storage and maintenance
Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?
Security and risk management
Which domain involves conducting, collecting, and analyzing data, as well as conducting security audits to monitor for risks, threats, and vulnerabilities?
Security assessment and testing
A security professional receives an alert that an unknown device has connected to their organization's internal network. They follow policies and procedures to quickly stop the potential threat. Which domain does this scenario describe?
Security operations
A security professional is asked to teach employees how to avoid inadvertently revealing sensitive data. What type of training should they conduct?
Training about social engineering
Fill in the blank: A _____ is malicious code written to interfere with computer operations and cause damage to data.
computer virus
Question 3 Fill in the blank: Social engineering is a _____ that exploits human error to gain private information, access, or valuables.
manipulation technique