
MCyber_Chap22N23
Authored by Marcus Phang
Information Technology (IT)
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What law protects the privacy of an employee’s personal information from being shared with third parties?
Answer explanation
The Gramm-Leach-Bliley Act (GLBA) is a piece of legislation that mainly affects the financial industry.
However, a portion of that legislation also provides opt-out provisions for individuals, putting them in control of how the information they share with an organization during a business transaction is used.
The GLBA restricts information sharing with third party organizations.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the primary goal of IT security governance?
Answer explanation
IT security governance determines who is authorized to make decisions about cybersecurity risks within an organization.
It demonstrates accountability and provides oversight to ensure that any risks are adequately mitigated and that security strategies are aligned with the organization’s business objectives and are compliant with regulations.
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An organization has experienced several incidents involving employees downloading unauthorized software and using unauthorized websites and personal USB devices. What measures could the organization implement to manage these threats? (Choose three correct answers)
Answer explanation
An organization should implement measures to manage user threats, including:
1) Conduct security awareness training to prevent employees from falling victim to phishing scams.
2) Enabling content filtering to permit or deny specific domains in accordance with acceptable use policies.
3) Disabling internal CD drives and USB ports.
4) Enabling automatic antimalware scans for inserted media drives, files, and email attachments.
5) Allocating write and delete permissions to the data owner only.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What federal act law would an individual be subject to if they knowingly accessed a government computer without permission?
Answer explanation
Enacted in 1986 as an amendment to the Comprehensive Crime Control Act of 1984, CFAA prohibits unauthorized access to computer systems.
Knowingly accessing a government computer without permission or accessing any computer used in or affecting interstate or foreign commerce is a criminal offense. The Act also criminalizes the trafficking of passwords or similar access information, as well as knowingly transmitting a program, code or a command that results in damage.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What do penetration tests and red team exercises achieve?
Answer explanation
Organizations with significant resources and cybersecurity expertise run penetration tests and red team exercises (simulated attack exercises) to gauge the security capabilities of an organization.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following frameworks identifies controls based on the latest information about common cyber attacks and provides benchmarks for various platforms?
Answer explanation
The Center for Internet Security (CIS) developed a set of critical security controls to help organizations with different levels of resources and expertise at their disposal to improve their cyber defenses.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The ability to carry out highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence is covered in what category of the National Cybersecurity Workforce Framework?
Answer explanation
The National Institute of Standards and Technologies (NIST) created the National Cybersecurity Workforce Framework to support organizations seeking cybersecurity professionals. The framework organizes cybersecurity work into seven categories:
1) Operate and maintain – Provides the support, administration and maintenance required to ensure effective and efficient IT system performance and security.
2) Protect and defend – Identifies, analyzes, and mitigates threats to internal systems and networks.
3) Investigate – Investigates cybersecurity events and/or cyber-attacks involving IT resources.
4) Collect and operate – Provides specialized denial and deception operations and collection of cybersecurity information.
5) Analyze – Performs highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
6) Oversee and govern – Provides leadership, management, direction or development and advocacy so an organization may effectively conduct cybersecurity work.
7) Securely provision – Conceptualizes, designs, procures or builds secure IT systems.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?