Q: As a security analyst, you are responsible for protecting an organization’s low-level assets and high-importance assets. Which of the following is considered a low-level asset?
- Company trade secrets
- Intellectual property
- Guest Wi-Fi network
- Customer email addresses
Q: Which of the following statements best describes the relationship
between a security mindset and asset protection?
- A security mindset helps analysts protect high-importance assets.
- A security mindset helps analysts protect low-level assets.
- A security mindset helps analysts protect all levels of assets.
- A security mindset is not important for protecting assets.
Q: Which of the following examples are considered public data? Select
two answers.
- Press releases
- Passport numbers
- Product announcements
- Health insurance information
Q: Fill in the blank: One of the most important concerns for most
organizations is the protection of _____.
- customer data
- guest Wi-Fi
- job postings
- social media
Q: Fill in the blank: The decisions a security analyst makes can affect
the organization that the analyst works for and other team members across the
organization. These decisions also affect ______.
- the analyst’s chance for a promotion
- the customers of the organization that hired the analyst
- the financial markets
- competitors in the industry
Q: What are some ways that security analysts protect data? Select three
answers.
- Ignoring small events
- Reporting small events
- Understanding the organization’s assets
- Paying attention to detail
Q: What is the correct term for a security event that results in a data
breach?
- Phishing incident
- Compromised data
- Security incident
- Data security event
Q: Fill in the blank: An organization is responsible for protecting its
customers’ sensitive data. Examples of the kinds of sensitive data that must be
protected include ____ and _____. Select two answers.
- private social media pages
- bank statements
- social security numbers
- website URLs
Q: Which of the following are the best examples of possible consequences
of a data breach? Select two answers.
- Improved hardware functionality
- Regulatory fines
- Significant reduction in employee retention
- Loss of credibility
Q: Which concept focuses on understanding how to evaluate risk and
identify the potential for a breach of a system, application, or data?
- Security analyst evaluation
- Security recognition
- Python knowledge
- Security mindset
Q: Fill in the blank: Entry-level analysts can help protect low-level
assets, such as an organization’s _____.
- financial information
- guest Wi-Fi network
- company job descriptions
- trade secrets
Q: Who will be affected by the decisions you make as a security
analyst? Select two answers.
- Competitors in the same industry
- The financial markets
- The customers of the organization that hired you
- The organization that hired you
Q: Fill in the blank: _____ must be protected at all times. An
organization can lose its credibility with its customers if it is not properly
protected.
- Employee salaries
- An organization’s termination policy
- An organization’s social media page
- Sensitive customer data
Q: Fill in the blank: A security mindset is the _____.
- ability to help an organization’s human resources (HR) department remain compliant at all times
- intent to provide quality security services to an organization’s development operations team
- opportunity to showcase your Linux and other coding related technical skills
- ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data
Q: As a security analyst, you are responsible for protecting an
organization’s low-level assets and high-level assets. Which of the following
is considered a high-level asset?
- Company job descriptions
- Public press releases
- Guest Wi-Fi network
- Intellectual property
Q: Fill in the blank: _____ are interested in protecting sensitive
financial data, customers’ usernames and passwords, and third-party vendor
security.
- Social media influencers
- Web programmers
- HIPAA compliance officers
- Stakeholders
Q: What are some examples of the customer data that security analysts
protect? Select two answers.
- Credit card numbers
- Product announcements
- Newsletters
- Passwords
Q: Which of the following defines a security incident?
- A breach that disrupts the physical security of an organization
- A security event that does not result in a data breach
- A security event that results in a data breach
- A breach that disrupts the cloud security of an organization
Q: Which of the following can cause a company to experience loss of
credibility, financial loss, or regulatory fines?
- The resignation of the company’s social media manager
- Employee security awareness training
- A data breach
- A Cybersecurity Awareness Month phishing program
Q: Which of the following is an essential way to maintain a security
mindset?
- Seek engineering mentors
- Evaluate risks
- Work various security jobs with different organizations
- Escalate major security issues within one week
Q: Which of the following assets can be protected by adopting a
security mindset? Select three answers.
- Intellectual property
- Sensitive customer data
- Network equipment
- Financial information
Q: Which of the following are examples of private data? Select two
answers.
- Customer bank account information
- Government trade agreements
- Employee identification numbers
- Employee email addresses
Q: What term is used to describe individuals of an organization who are
interested in protecting sensitive financial data, customers’ usernames and
passwords, and third-party vendor security?
- Data managers
- Stakeholders
- Information protection advisors
- Executive security administrators
Q: Fill in the blank: A security analyst should _____ escalate
potential security events.
- sometimes
- rarely
- always
- never