Q: Fill in the blank: The purpose of ______ is to protect networks, devices, people, and data from unauthorized access or criminal exploitation.
- planning
- cybersecurity
- business continuity
- change-management
- Examining in-house security issues
- Installing prevention software
- Creating organizational policies
- Protecting computer and network systems
Q: Someone outside of
an organization attempts to gain access to its private information. What type
of threat does this scenario describe?
- External
- Accidental
- Internal
- Ethical
Q: Fill in the blank:
Identity theft is the act of stealing _______ to commit fraud while
impersonating a victim.
- hardware
- personal information
- business records
- trade secrets
Q: What are some key
benefits associated with an organization meeting regulatory compliance? Select
two answers.
- Recruiting employees
- Upholding ethical obligations
- Identifying trends
- Avoiding fines
Q: Which of the
following proficiencies are examples of technical skills? Select two answers.
- Applying computer forensics
- Communicating with employees
- Automating tasks with programming
- Prioritizing collaboration
Q: Fill in the blank:
Security information and event _____ (SIEM) tools enable security
professionals to identify and analyze threats, risks, and vulnerabilities.
- mitigation
- management
- monitoring
- maturity
Q: A security
professional receives an alert about an unknown user accessing a system within
their organization. They attempt to identify, analyze, and preserve the
associated criminal evidence. What security task does this scenario describe?
- Programming with code
- Resolving error messages
- Computer forensics
- Software upgrades
Q: Which of the
following statements accurately describes personally identifiable information
(PII) and sensitive personally identifiable information (SPII)? Select all that
apply.
- Pll is any information used to infer an individual’s identity.
- An example of SPII is someone’s biometric data.
- Only SPII is vulnerable to identity theft.
- An example of PII is someone’s phone number.
Q: A security
professional collaborates with information technology teams to deploy an
application that helps identify risks and vulnerabilities. What does this
scenario describe?
- Conducting a security audit
- Upgrading network capacity
- Installing detection software
- Ethical hacking
Q: An employee
receives an email that they believe to be legitimate. They click on a
compromised link within the email. What type of internal threat does this
scenario describe?
- Accidental
- Abusive
- Operational
- Intentional
Q: Fill in the blank:
An organization that is in regulatory compliance is likely to ____ fines.
- rectify
- encounter
- avoid
- incur
Q: Fill in the blank:
Security information and _____ management (SIEM) tools enable security
professionals to identify and analyze threats, risks, and vulnerabilities.
- event
- enterprise
- employer
- emergency
Q: A security
professional investigates an alert about an unknown user accessing a system
within their organization. What is the purpose of computer forensics in this
situation?
- Identify, analyze, and preserve criminal evidence
- Make upgrades to network security
- Implement tools that help detect an incident
- Establish new security frameworks, controls, and regulations for the business
Q: An individual has
their personal information stolen. They discover that someone is using that
information to impersonate them and commit fraud. What does this scenario
describe?
- Secured customer data
- Data breach
- Identity theft
- Network infiltration