Cyber Security Questions

Ace your homework & exams now with Quizwiz!

A________________ is malicious code written to interfere with computer operations and cause damage.

Computer Virus

What historical event resulted in one of the largest known thefts of sensitive data, including social security numbers?

Equifax Breach

Which domain involves defining security goals and objectives, risk mitigation, compliance, business continuity, and the law?

Security and Risk Management

Social engineering is a _______________ that exploits human error to gain private information, access, or valuables.

manipulation technique

Which of the following tasks may be part of the security operations domain ?

1. Conducting Investigations 2.Implementing Preventative Measures 3. Investigating an unknown device that has connected to an internal network

Which of the following tasks may be part of the security architecture and engineering domain?

1. Ensuring that effective systems and processes are in place 2. Configuring a firewall

Which of the following threats are most likely to occur in the event of a phishing attack?

1. malicious software being deployed 2.Employees inadvertently revealing sensitive data 3.

Which domain involves keeping data secure by ensuring users follow established policies to control and manage physical assets?

Identity and Access Management

A security professional is auditing user permissions at their organization in order to ensure employees have the correct access level. Which domain does this scenario describe?

Security Assessment and Testing


Related study sets

Ch.5: Dwelling Property (DP) Policies

View Set

hesi next gen case studies for med surg

View Set

Intro to Business FINAL EXAM Ch.16-20 & Ch. C

View Set

Rad Protection Chapter 1 Workbook

View Set