MCyber_Chap22N23

MCyber_Chap22N23

Professional Development

22 Qs

quiz-placeholder

Similar activities

Review of Application Software

Review of Application Software

Professional Development

20 Qs

Exam Prep 2

Exam Prep 2

Professional Development

20 Qs

CompTIA A+ Flash Cards (ONT-XSS)

CompTIA A+ Flash Cards (ONT-XSS)

Professional Development

20 Qs

Network Switch and VLAN Quiz

Network Switch and VLAN Quiz

Professional Development

21 Qs

ALTSCHOOL QUIZ 13/9/25

ALTSCHOOL QUIZ 13/9/25

Professional Development

25 Qs

Bendy and the ink machine

Bendy and the ink machine

Professional Development

26 Qs

Networking Devices and Protocols Quiz

Networking Devices and Protocols Quiz

Professional Development

20 Qs

Structured Cabling and Networking Quiz

Structured Cabling and Networking Quiz

Professional Development

20 Qs

MCyber_Chap22N23

MCyber_Chap22N23

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Hard

Created by

Marcus Phang

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What law protects the privacy of an employee’s personal information from being shared with third parties?

SOX
GLBA
PCI DSS
FIRPA

Answer explanation

The Gramm-Leach-Bliley Act (GLBA) is a piece of legislation that mainly affects the financial industry.

However, a portion of that legislation also provides opt-out provisions for individuals, putting them in control of how the information they share with an organization during a business transaction is used.

The GLBA restricts information sharing with third party organizations.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of IT security governance?

To provide a set of policies and procedures to manage sensitive data
To provide oversight to ensure that risks are adequately mitigated
To define a set of controls that an organization should implement
To make decisions to mitigate risk

Answer explanation

IT security governance determines who is authorized to make decisions about cybersecurity risks within an organization.

It demonstrates accountability and provides oversight to ensure that any risks are adequately mitigated and that security strategies are aligned with the organization’s business objectives and are compliant with regulations.

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

An organization has experienced several incidents involving employees downloading unauthorized software and using unauthorized websites and personal USB devices. What measures could the organization implement to manage these threats? (Choose three correct answers)

Implement disciplinary action
Monitor all employee activity
Disable USB access
Provide security awareness training
Use content filtering

Answer explanation

An organization should implement measures to manage user threats, including:
1) Conduct security awareness training to prevent employees from falling victim to phishing scams.

2) Enabling content filtering to permit or deny specific domains in accordance with acceptable use policies.

3) Disabling internal CD drives and USB ports.

4) Enabling automatic antimalware scans for inserted media drives, files, and email attachments.

5) Allocating write and delete permissions to the data owner only.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What federal act law would an individual be subject to if they knowingly accessed a government computer without permission?

CFAA
GLBA
ECPA
SOX

Answer explanation

Enacted in 1986 as an amendment to the Comprehensive Crime Control Act of 1984, CFAA prohibits unauthorized access to computer systems.

Knowingly accessing a government computer without permission or accessing any computer used in or affecting interstate or foreign commerce is a criminal offense. The Act also criminalizes the trafficking of passwords or similar access information, as well as knowingly transmitting a program, code or a command that results in damage.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What do penetration tests and red team exercises achieve?

They simulate attacks to gauge the security capabilities of an organization.
They provide audit controls for all NetBIOS connections made.
They provide a list of malware that has successfully penetrated the firewall.
They provide audit trails for all TCP connections in place at any given time.

Answer explanation

Organizations with significant resources and cybersecurity expertise run penetration tests and red team exercises (simulated attack exercises) to gauge the security capabilities of an organization.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following frameworks identifies controls based on the latest information about common cyber attacks and provides benchmarks for various platforms?

CSA
The National Cybersecurity Workforce
CIS
ISO

Answer explanation

The Center for Internet Security (CIS) developed a set of critical security controls to help organizations with different levels of resources and expertise at their disposal to improve their cyber defenses.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The ability to carry out highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence is covered in what category of the National Cybersecurity Workforce Framework?

Protect and defend
Oversight and development
Security provision
Analyze

Answer explanation

The National Institute of Standards and Technologies (NIST) created the National Cybersecurity Workforce Framework to support organizations seeking cybersecurity professionals. The framework organizes cybersecurity work into seven categories:

1) Operate and maintain – Provides the support, administration and maintenance required to ensure effective and efficient IT system performance and security.

2) Protect and defend – Identifies, analyzes, and mitigates threats to internal systems and networks.

3) Investigate – Investigates cybersecurity events and/or cyber-attacks involving IT resources.

4) Collect and operate – Provides specialized denial and deception operations and collection of cybersecurity information.

5) Analyze – Performs highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

6) Oversee and govern – Provides leadership, management, direction or development and advocacy so an organization may effectively conduct cybersecurity work.

7) Securely provision – Conceptualizes, designs, procures or builds secure IT systems.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?