Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Professional Development

12 Qs

quiz-placeholder

Similar activities

DBMS

DBMS

Professional Development

10 Qs

Hacker-Powered Security Report 2024-25

Hacker-Powered Security Report 2024-25

Professional Development

10 Qs

Digital Footprint Seminar Assessment

Digital Footprint Seminar Assessment

Professional Development

15 Qs

Module 3 - Dark web

Module 3 - Dark web

Professional Development

7 Qs

AI Models - Pop Quiz - Dubai Event 2024

AI Models - Pop Quiz - Dubai Event 2024

Professional Development

10 Qs

ISMS Awareness

ISMS Awareness

Professional Development

10 Qs

DST07 Day 1 quiz

DST07 Day 1 quiz

Professional Development

12 Qs

CyberSecurity

CyberSecurity

Professional Development

13 Qs

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Gordon Bjorman

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image
In the CIA triad, what does "Integrity" address?
Makes information accessible to only authorized persons
Makes sure information is not changed
Makes sure information is accesible when needed
None Of the Above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Compliance rules are one of the primary concerns for information & cyber security professionals as existing rules are enforced and new laws are created.

True
False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Business Risk is determined by…

information + availability + defense

vulnerability + attacks + remediation

assets + vulnerability + threat

assessment + information + defense

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image
The process used to understand the nature and extent of risk is…
Risk appetite
Control baseline
Risk avoidance
Risk assessment

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

For automobile companies, a microchip shortage could be categorized as what type of risk

Pandemic

Industry

Compliance

Digital

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image
What type of attack gives hackers remote control of a device?
Keylogger
Vishing
Rootkit
Worm

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Hackers that use their abilities to support an ideological agenda are categorized as…

Nation State Threat Actors

Hacktivists

Unethical Hackers

APT's

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?