Lesson 1: Comparing Security Roles and Security Controls

Lesson 1: Comparing Security Roles and Security Controls

8th Grade

10 Qs

quiz-placeholder

Similar activities

POCS-Ch1.3 (Vocab)

POCS-Ch1.3 (Vocab)

6th - 8th Grade

10 Qs

Physical Security

Physical Security

1st Grade - University

10 Qs

Communication & Networking - Client Server & Peer to Peer

Communication & Networking - Client Server & Peer to Peer

2nd - 12th Grade

10 Qs

Cyber Security Measures Yr8

Cyber Security Measures Yr8

7th - 9th Grade

10 Qs

InfiInformation technology Quiz

InfiInformation technology Quiz

6th - 8th Grade

8 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Cyber Security Quiz

Cyber Security Quiz

6th - 8th Grade

15 Qs

computer security

computer security

KG - 12th Grade

12 Qs

 Lesson 1: Comparing Security Roles and Security Controls

Lesson 1: Comparing Security Roles and Security Controls

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Toni Barnes

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security related phrase relates to the integrity of data?

Availability

Modification

Confidentiality

Risk

Answer explanation

Any modification is authorized and is stored and transferred as intended when referring to the integrity of data. Integrity is part of the CIA triad.

Availability means that any information is accessible to those authorized to view or modify it. Availability is part of the CIA triad.

Confidentiality means that certain information should only be known to certain people. Confidentiality is part of the CIA triad.

Risk is the likelihood and impact (or consequence) of a threat actor exploiting a vulnerability.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An engineer looks to implement security measures by following the five functions in the National Institute of Standards and Technology (NIST) Cybersecurity Framework. When documenting the “detect” function, what does the engineer focus on?

Evaluate risks and threats

Install, operate, and decommission assets

Ongoing proactive monitoring

Restoration of systems and data

Answer explanation

Detect refers to performing ongoing proactive monitoring to ensure that controls are effective and capable of protecting against new types of threats.

Identify covers developing security policies and capabilities, and evaluating risks, threats, and vulnerabilities and recommend security controls to mitigate them.

Protect and procure covers the processes to install, operate, and decommission IT hardware and software assets with security as an embedded requirement of every stage of an operations life cycle.

Recovery deals with the implementation of cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How might the goals of basic network management not align with the goals of security?

Management focuses on confidentiality and availability.

Management focuses on confidentiality over availability.

Management focuses on integrity and confidentiality.

Management focuses on availability over confidentiality.

Answer explanation

Security is increasingly thought of as a dedicated function. The goals of a network manager are not always well-aligned with the goals of security; network management focuses on availability over confidentiality.

System security may be a dedicated business unit with its own management structure. As a result, network management might only concern itself with availability.

The goals of a basic network management are not always well-aligned with the goals of security; network management would not focus on confidentiality, but rather availability.

Network management would encompass the responsibility for systems up-time and availability. Security administrators would focus on integrity and confidentiality.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any external responsibility for an organization’s security lies mainly with which individuals?

The senior executives

Tech staff

Managers

Public relations

Answer explanation

External responsibility for security (due care or liability) lies mainly with owners or senior executives. It is important to note that all employees share some measure of responsibility.

Technical and specialist staff have the direct responsibility for implementing, maintaining, and monitoring the policy. Security might be made a core competency of systems and network administrators, or there may be dedicated security administrators.

Managers at an organization may have responsibility for a specific domain or unit, such as building control, ICT, or accounting.

Non-technical staff have the responsibility of complying with policy and with any relevant legislation. Public relations is responsible for media communications.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the "respond" function?

Evaluate risks, threats, and vulnerabilities.

Perform ongoing, proactive monitoring.

Implement resilience to restore systems

Identify, analyze, and eradicate threats.

Answer explanation

The identify function is to develop security policies and capabilities. This function is used to evaluate risks, threats, and vulnerabilities and recommend security controls to mitigate them.

The detect function is to perform ongoing, proactive monitoring to ensure that controls are effective and capable of protecting against new types of threats.

The recover function is to implement cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.

The respond function is to identify, analyze, contain, and eradicate threats to systems and data security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has an annual contract with an outside firm to perform a security audit on their network. The purpose of the annual audit is to determine if the company is in compliance with their internal directives and policies for security control. Select the broad class of security control that accurately demonstrates the purpose of the audit.

Managerial

Technical

Physical

Compensating

Answer explanation

Managerial is the control that gives oversight of the information system including selection of other security controls. An example of this type of control is regular scans and audits.

Technical control is implemented as a system (hardware, software, or firmware). For example, firewalls, antivirus software, and OS access control models are technical controls. Technical controls may also be described as logical controls.

Physical controls deter access to premises and hardware. Examples include alarms, gateways, and locks.

A compensating control serves as a substitute for a principal control, as recommended by a security standard, and affords the same (or better) level of protection but uses a different methodology or technology.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The _____ requires federal agencies to develop security policies for computer systems that process confidential information.

Sarbanes-Oxley Act (SOX)

Computer Security Act

Federal information Security Management Act (FISMA

Gramm-Leach-Bliley Act (GLBA)

Answer explanation

The Computer Security Act (1987) specifically requires federal agencies to develop security policies for computer systems that process confidential information.

The Sarbanes-Oxley Act (2002) mandates the implementation of risk assessments, internal controls and audit procedures. This act is not for any specific entity.

The Federal Information Security Management Act (2002) governs the security of data processed by federal government agencies. This act requires agencies to implement an information security program.

The Gramm-Leach-Bliley Act (1999) is a United States federal law that requires financial institutions to explain how they share and protect their customers' private information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?