Cybersecurity Leadership & Operations Quiz

Cybersecurity Leadership & Operations Quiz

University

15 Qs

quiz-placeholder

Similar activities

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

First Quiz - CS326B

First Quiz - CS326B

University

15 Qs

Password Managers

Password Managers

University

20 Qs

Chapter 3 - System Development of E-Commerce Applications

Chapter 3 - System Development of E-Commerce Applications

University

10 Qs

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

University

15 Qs

Sec+ Book Questions Ch. 5 1/2

Sec+ Book Questions Ch. 5 1/2

University

10 Qs

Chapter 3 Exploring Network Technologies and Tools

Chapter 3 Exploring Network Technologies and Tools

University

20 Qs

Storage Concepts, Chapter 5 & Office 2016 Pop Quiz

Storage Concepts, Chapter 5 & Office 2016 Pop Quiz

University

10 Qs

Cybersecurity Leadership & Operations Quiz

Cybersecurity Leadership & Operations Quiz

Assessment

Quiz

Computers

University

Easy

Created by

Soufiane Elhamdani

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A Chief Information Security Officer (CISO) is establishing a new cybersecurity program. Which of the following should be developed FIRST to provide the overall direction, scope, and tone for the organization's security efforts?

Security procedures

System security baselines

An information security policy

A patch management schedule

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization has identified a vulnerability in a legacy system. The cost to fix the vulnerability is estimated to be 150,000$. The cybersecurity team′s analysis shows the maximum potential loss from this vulnerability is only 5,000$ , with a low probability of occurrence. The leadership team decides not to apply a patch or implement any new controls. What risk management strategy is being applied?

Risk transference

Risk avoidance

Risk mitigation

Risk acceptance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security manager installs a firewall to block unauthorized network traffic from entering the company's internal network. What type of control is a firewall?

Corrective and administrative

Detective and physical

Preventive and technical

Recovery and operational

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To reduce the potential for successful cyberattacks, a security team is tasked with identifying and eliminating all non-essential services, open ports, and unnecessary user accounts on its public-facing servers. This practice is a core component of:

Risk transference

Attack surface management

Incident response

Business continuity planning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software vendor has just released a critical security update for a zero-day vulnerability that is being actively exploited. Which of the following is the MOST appropriate immediate action for a cybersecurity leader to direct?

Wait for the next scheduled maintenance window to apply the patch.

Perform an emergency change request to test and deploy the patch.

Commission a third-party penetration test to validate the vulnerability.

Update the security policy to reflect the new threat.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A system administrator is hardening a new server before it is deployed to the production environment. The administrator uses a standardized checklist to ensure all security settings are configured to a specific, secure state. This standardized state is known as a:

Security baseline

Maintenance window

Risk register

Security policy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has a policy that all employees must complete mandatory security awareness training annually. From a governance perspective, what type of control is this training?

Physical

Technical

Administrative

Corrective

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?