Search Header Logo

Chapter 01 - Basic Objectives of CS

Authored by Ayomide Oluwaga

Computers

Professional Development

Used 6+ times

Chapter 01 - Basic Objectives of CS
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which category of control is focused on the management of security policies and procedures within an organization?

Operational

Technical

Corrective

Managerial

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Jade's organization recently suffered a security breach that affected stored credit card data. Jade's primary concern is the fact that the organization is subject to sanctions for violating the provisions of the Payment Card Industry Data Security Standard. What category of risk is concerning Jade?

Strategic

Compliance

Operational

Financial

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Chris is responding to a security incident that compromised one of his organization's web servers. He believes that the attackers defaced one or more pages on the website. What cybersecurity objective did this attack violate?

Confidentiality

Nonrepudiation

Integrity

Availability

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Gwen is exploring a customer transaction reporting system and discovers the table shown here. What type of data minimization has most likely been used on this table?

Destruction

Masking

Tokenization

Hashing

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Tonya is concerned about the risk that an attacker will attempt to gain access to her organization's database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement?

Preventive

Detective

Corrective

Deterrent

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Greg is implementing a data loss prevention system. He would like to ensure that it protects against transmissions of sensitive information by guests on his wireless network. What DLP technology would best meet this goal?

Watermarking

Pattern recognition

Host-based

Network-based

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What term best describes data that is being sent between two systems over a network connection?

Data at rest

Data in motion

Data in processing

Data in use

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?